Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
0bca2b1a5d98e39c030780bf605b28c3_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0bca2b1a5d98e39c030780bf605b28c3_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
0bca2b1a5d98e39c030780bf605b28c3_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
0bca2b1a5d98e39c030780bf605b28c3
-
SHA1
903f4543f13e144f950ffee7978ee8b233cba21a
-
SHA256
4b7ab9a1f41bd5f82b5bc993eec8cd20d3c64ac954c6ef92f6dff4fb603e794e
-
SHA512
c64dc0ef56c119d4008f68c17ca3d92c7892126601cea9aad8f4ffe21c34700243c6f115d5b8f6ba72ca8720d557d6f23d456529e4916480c0b8557f52bc8c82
-
SSDEEP
49152:Qoa1taC070dvm9t9YQb+p20QoAHm3DjUsfa1xrijKeFy:Qoa1taC0rthip23oAG33U/7eGeFy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2252 1FEF.tmp -
Executes dropped EXE 1 IoCs
pid Process 2252 1FEF.tmp -
Loads dropped DLL 1 IoCs
pid Process 2344 0bca2b1a5d98e39c030780bf605b28c3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2252 2344 0bca2b1a5d98e39c030780bf605b28c3_JaffaCakes118.exe 28 PID 2344 wrote to memory of 2252 2344 0bca2b1a5d98e39c030780bf605b28c3_JaffaCakes118.exe 28 PID 2344 wrote to memory of 2252 2344 0bca2b1a5d98e39c030780bf605b28c3_JaffaCakes118.exe 28 PID 2344 wrote to memory of 2252 2344 0bca2b1a5d98e39c030780bf605b28c3_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bca2b1a5d98e39c030780bf605b28c3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0bca2b1a5d98e39c030780bf605b28c3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\1FEF.tmp"C:\Users\Admin\AppData\Local\Temp\1FEF.tmp" --splashC:\Users\Admin\AppData\Local\Temp\0bca2b1a5d98e39c030780bf605b28c3_JaffaCakes118.exe B28EB19E7BF799F0E52214FD9E137E2F25B960C64F1B603DD05D35FF015226722AA3F80203BFF6C527FC5B5952EFF39BCD84C9913096600E292366964E1E8E502⤵
- Deletes itself
- Executes dropped EXE
PID:2252
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5712feb958bafff238260df3dd659b5a9
SHA16b61de3d872691e5a6ebac0c27eed20c75c209c3
SHA2564596fe55de1f2e9d46d1ac326ac31e99372e678219b85184eff37812c0070703
SHA512f6fa298939cd9dc92d4ff85e1356be150f4326b64c7adedf458f23687859fa6a5c92672873d1e967b76d7e32fafb92652811736946bc5b4310b920eff3e7dff7