Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/04/2024, 11:12
Static task
static1
Behavioral task
behavioral1
Sample
d2294c22a42d7403a7fc6b7759aafe12_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d2294c22a42d7403a7fc6b7759aafe12_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
d2294c22a42d7403a7fc6b7759aafe12_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
d2294c22a42d7403a7fc6b7759aafe12
-
SHA1
c27701c01600c5b04b165727b57593007dd6500f
-
SHA256
b1d9f55211f508cf3c8137725230839bfdf7bc713a3363d8613c6b7a118a31e5
-
SHA512
3c1d781261eedaade804231c4cf18c966ab13d6759687492f8073b513b86d44c8286f449ccc0d7ac1e64f401738c324d5456d31ba05b595687d6c36d9708487b
-
SSDEEP
49152:Qoa1taC070d2FoKae6VHwg4mWy6ZX/oPT2IFcq9oV99zI:Qoa1taC0LFoAeBmk2bq9oVfM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1932 26B3.tmp -
Executes dropped EXE 1 IoCs
pid Process 1932 26B3.tmp -
Loads dropped DLL 1 IoCs
pid Process 2172 d2294c22a42d7403a7fc6b7759aafe12_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1932 2172 d2294c22a42d7403a7fc6b7759aafe12_JaffaCakes118.exe 28 PID 2172 wrote to memory of 1932 2172 d2294c22a42d7403a7fc6b7759aafe12_JaffaCakes118.exe 28 PID 2172 wrote to memory of 1932 2172 d2294c22a42d7403a7fc6b7759aafe12_JaffaCakes118.exe 28 PID 2172 wrote to memory of 1932 2172 d2294c22a42d7403a7fc6b7759aafe12_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2294c22a42d7403a7fc6b7759aafe12_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d2294c22a42d7403a7fc6b7759aafe12_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\26B3.tmp"C:\Users\Admin\AppData\Local\Temp\26B3.tmp" --splashC:\Users\Admin\AppData\Local\Temp\d2294c22a42d7403a7fc6b7759aafe12_JaffaCakes118.exe 3496DE56502F5746EBE96AA18391CEE230D30C8586E370E041C2A217A96537A1635F11F7DDA63F34EA34AFF25108E63DB52BA8A258FAF4B5D7814D69ED4F3F5C2⤵
- Deletes itself
- Executes dropped EXE
PID:1932
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5147d9dd87d27f1b23b5b3fded288eeba
SHA13447b00c75999cb580e98e56c1834606dad0326f
SHA25612de22bebe9f94765664674284e1f908d776de7f23fb8c3e437d1a4bc521c24d
SHA512ca292254cfcf039b83746993dd8e6858bc26fee73acfd6c1a9c5a1264475425210d2463399565993acf24bd0ba36732e930e99a344af3893f73da126a6d39267