Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/04/2024, 23:37
Static task
static1
Behavioral task
behavioral1
Sample
c4d2f247040c44ec2471916c7792ea06_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4d2f247040c44ec2471916c7792ea06_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
c4d2f247040c44ec2471916c7792ea06_JaffaCakes118.exe
-
Size
147KB
-
MD5
c4d2f247040c44ec2471916c7792ea06
-
SHA1
b87219cc70a673b14022718745c066044c9a9fb2
-
SHA256
22a8bd45fe17fe81ddd8f43dda235c4e16d18a430db8b2d812ad5ae30f925ac4
-
SHA512
ea2d510ec3e5fef1670c9964b12dd276e8711685ca7edf2b5eee08c73acbdfe038a6d64d3279cfe2f65e73a38c91468e54202763542904b8e761472ac8d8cd22
-
SSDEEP
3072:2CMiqJl3v1S4AsvdhxBz8bNk/AKItB/pL/s9hlSLUFWzv:2CMzfM4vxBIO+XpDnUUzv
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 876 tbckyxk.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\tbckyxk.exe c4d2f247040c44ec2471916c7792ea06_JaffaCakes118.exe File created C:\PROGRA~3\Mozilla\newtrln.dll tbckyxk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 876 2364 taskeng.exe 31 PID 2364 wrote to memory of 876 2364 taskeng.exe 31 PID 2364 wrote to memory of 876 2364 taskeng.exe 31 PID 2364 wrote to memory of 876 2364 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4d2f247040c44ec2471916c7792ea06_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c4d2f247040c44ec2471916c7792ea06_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
PID:2236
-
C:\Windows\system32\taskeng.exetaskeng.exe {F0988B4D-09F6-4F78-A063-6641B58E5F7A} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\PROGRA~3\Mozilla\tbckyxk.exeC:\PROGRA~3\Mozilla\tbckyxk.exe -gqpcbye2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147KB
MD57b0ad8a88330ab28bc835b7ef0dd6432
SHA1b53b0f28ddb036adaa65557c6b4173f21593f475
SHA256802e7365f28899be3a2ed5387360d2db9f22e452d8775f282bedf8aff1e114d7
SHA5126fa67b5cdfe0bc64e6d4e4d27cedee9bfb3f3780422a3d318075df84eaa3b13c6414be8eefaeba0ae95362b65a9ed5f6e5a61d35d6141c1a181bf8001ffc298a