Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/04/2024, 17:47

General

  • Target

    da8eb62581ee73caf1ce481aa1202d08_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    da8eb62581ee73caf1ce481aa1202d08

  • SHA1

    a7fa12e3ce22765b4b4d72b0d698bd998a456132

  • SHA256

    321832fd912f1d551238f94564c966e2f96062ee6bc503d786ea1dd2f25be42c

  • SHA512

    f4ebcffce40b99f8b7f0f0651f9c444f910c7bb19800683750dd695bbc18782c4f66ef004d4608f091492d0c13d80adce7b87d117ed6e2ba77c035244b5d97bf

  • SSDEEP

    49152:Qoa1taC070dnWDcadX3DzFvloRxB4aZQkCbtT2wAFZWHg:Qoa1taC0GWAw3VEcbtT2Zj

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da8eb62581ee73caf1ce481aa1202d08_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\da8eb62581ee73caf1ce481aa1202d08_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Users\Admin\AppData\Local\Temp\277E.tmp
      "C:\Users\Admin\AppData\Local\Temp\277E.tmp" --splashC:\Users\Admin\AppData\Local\Temp\da8eb62581ee73caf1ce481aa1202d08_JaffaCakes118.exe F3C63DDEDE02208AFBC615B11CA0E8720594DE8E4F0C95BC987371AC370B08053DAF08C0F8DABC0C096A8F8D38D086B7B2566FA30055ECBECDE9C9CE952C5676
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1692

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\277E.tmp

    Filesize

    1.9MB

    MD5

    724eae3db83f04fdb216d117a8727e74

    SHA1

    f93560e464092798ee0df99176a4cff7c559511b

    SHA256

    946358ec41e5feb6ab5d2111b03fbf19d4aaf00d74110c695c0a53cfef70a148

    SHA512

    9a8f7cf04ebcb0c1590b9d016bbc9a9f81f886aba528c6e5bf67de52c6332fd14ee231e6be621195b3286d68b62ca9bcc18aaf2ab40c69d22a84b0b0c32e8497

  • memory/1692-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2992-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB