Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 19:39
Static task
static1
Behavioral task
behavioral1
Sample
0e4c54361b6adca1f57509b1290f65f9_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0e4c54361b6adca1f57509b1290f65f9_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
0e4c54361b6adca1f57509b1290f65f9_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
0e4c54361b6adca1f57509b1290f65f9
-
SHA1
46646a44f706816b9f9adef38ad8d46b1282cefc
-
SHA256
612aa77dc4afa119d9a5d092d2d996c3a201d15efafbd3948ad5ae54333f42b0
-
SHA512
bbabc90bbc6b243a9fc2690e21728fdc6796ae1a49612a81e51c0b2510e1ba0ede04b28ac8249d74710b8426b3dd7e651390bb09615207051e5fea7064210c6b
-
SSDEEP
49152:Qoa1taC070d/iUQIjyk7yVLQhOUCmtkkEaPBYN:Qoa1taC0Sbm2IgOUtwaBYN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2092 168D.tmp -
Executes dropped EXE 1 IoCs
pid Process 2092 168D.tmp -
Loads dropped DLL 1 IoCs
pid Process 1072 0e4c54361b6adca1f57509b1290f65f9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1072 wrote to memory of 2092 1072 0e4c54361b6adca1f57509b1290f65f9_JaffaCakes118.exe 28 PID 1072 wrote to memory of 2092 1072 0e4c54361b6adca1f57509b1290f65f9_JaffaCakes118.exe 28 PID 1072 wrote to memory of 2092 1072 0e4c54361b6adca1f57509b1290f65f9_JaffaCakes118.exe 28 PID 1072 wrote to memory of 2092 1072 0e4c54361b6adca1f57509b1290f65f9_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e4c54361b6adca1f57509b1290f65f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e4c54361b6adca1f57509b1290f65f9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\168D.tmp"C:\Users\Admin\AppData\Local\Temp\168D.tmp" --splashC:\Users\Admin\AppData\Local\Temp\0e4c54361b6adca1f57509b1290f65f9_JaffaCakes118.exe 51E01AFFC8AE92CC3A3E9A362A5F8D03B18CA54F7F77A5B99D39EA16F1E13351B3CAE8B17933F5A26508DE75F5F5C6749F271EC0C1907F62A8C19C89CC1D61D92⤵
- Deletes itself
- Executes dropped EXE
PID:2092
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD555adc362712ea4ea013de0b4e10e14e0
SHA1537fd391d05f13ca2b6f3340f9cd4c7cafbc4cbc
SHA2561fed05f16cdfe9063d6771806f5687cf6c707ba7fdc7577627c9731d8900f797
SHA5129a3d276dcef9da5b97ff1b4022116f6f10e133c6c147628c7c478a57497f6e48452ea63ec6eb62f222240143b8e0ad56c2b40673c7daf51eda99a82ce72d4ec6