Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
11c1896501dbf56a1b03f53cfdf9b9da_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
11c1896501dbf56a1b03f53cfdf9b9da_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
11c1896501dbf56a1b03f53cfdf9b9da_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
11c1896501dbf56a1b03f53cfdf9b9da
-
SHA1
72be2a9c2661c94c3d4690641db2c7a9304fc07a
-
SHA256
0f1e40d404d7deb39a253e43f7be422f4e9571015ff38a58e4d08c6c30dd3538
-
SHA512
ebd4d967e3a4777dea6c1b29209d32340fb78ebf51ee181879a881043d8b0cf9db84d718a16d930ddf6d696c2e31d7c29740ed8b322531ac03ac96b7501888ff
-
SSDEEP
24576:N2oo60HPdt+1CRiY2eOBvcj3u10dCxhRimeCJ84d+K3nzTfNcGqiFPs12X8m3+Vn:Qoa1taC070dYDjeCddXzTWsPJL39pjAZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2352 FAA.tmp -
Executes dropped EXE 1 IoCs
pid Process 2352 FAA.tmp -
Loads dropped DLL 1 IoCs
pid Process 2220 11c1896501dbf56a1b03f53cfdf9b9da_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2352 2220 11c1896501dbf56a1b03f53cfdf9b9da_JaffaCakes118.exe 28 PID 2220 wrote to memory of 2352 2220 11c1896501dbf56a1b03f53cfdf9b9da_JaffaCakes118.exe 28 PID 2220 wrote to memory of 2352 2220 11c1896501dbf56a1b03f53cfdf9b9da_JaffaCakes118.exe 28 PID 2220 wrote to memory of 2352 2220 11c1896501dbf56a1b03f53cfdf9b9da_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\11c1896501dbf56a1b03f53cfdf9b9da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\11c1896501dbf56a1b03f53cfdf9b9da_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\FAA.tmp"C:\Users\Admin\AppData\Local\Temp\FAA.tmp" --splashC:\Users\Admin\AppData\Local\Temp\11c1896501dbf56a1b03f53cfdf9b9da_JaffaCakes118.exe 49D132BC1D4F7F077070CD32C2DBAD1C3E2C408DA732E6B47E5A3210F25E2B56EBC3A105A3CC26654D0CD92F8CDB7EF0A8D12A0F7971CF0D7A2220DB09E36EF52⤵
- Deletes itself
- Executes dropped EXE
PID:2352
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5266c92b205b0e4652f12dd0384e6be04
SHA166716ebfc5a0f81afbf3c682789d12c8e263a43e
SHA256256b76e3fa82ad78ed5599d46c71013a9b7adf5703a8a0d2dfbf6afaec934766
SHA512fb95be22b4505441861c40de5581cff3ee6953e7f495e897414147a675a099976ac35a40805d669143c4b8bd8207c9087d078e3fef19d839a3050c2873d175ab