Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/04/2024, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
e050f9bc8dc86a9027677e536b68bb5f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e050f9bc8dc86a9027677e536b68bb5f_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
e050f9bc8dc86a9027677e536b68bb5f_JaffaCakes118.exe
-
Size
15KB
-
MD5
e050f9bc8dc86a9027677e536b68bb5f
-
SHA1
429549303e0fc1a3bfa145a7df4a2fbbad00295b
-
SHA256
1e26013d2acdcd11dde5c336e7f031c17460a0f45b7ef1c4becf5d860e1d03b6
-
SHA512
c6675aed9be6e21842107610f51f4cc86e6bcdc0132e1ca136232595af3a29e0bdb9e463747efd972fc935fec727cdf7d9dd52d54150a72f8ff95c274272b17a
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhY4l+aF:hDXWipuE+K3/SSHgxmg
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 3032 DEM5A9E.exe 2460 DEMB09A.exe 2640 DEM676.exe 808 DEM5C05.exe 1388 DEMB2BC.exe 1656 DEM982.exe -
Loads dropped DLL 6 IoCs
pid Process 1300 e050f9bc8dc86a9027677e536b68bb5f_JaffaCakes118.exe 3032 DEM5A9E.exe 2460 DEMB09A.exe 2640 DEM676.exe 808 DEM5C05.exe 1388 DEMB2BC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1300 wrote to memory of 3032 1300 e050f9bc8dc86a9027677e536b68bb5f_JaffaCakes118.exe 29 PID 1300 wrote to memory of 3032 1300 e050f9bc8dc86a9027677e536b68bb5f_JaffaCakes118.exe 29 PID 1300 wrote to memory of 3032 1300 e050f9bc8dc86a9027677e536b68bb5f_JaffaCakes118.exe 29 PID 1300 wrote to memory of 3032 1300 e050f9bc8dc86a9027677e536b68bb5f_JaffaCakes118.exe 29 PID 3032 wrote to memory of 2460 3032 DEM5A9E.exe 33 PID 3032 wrote to memory of 2460 3032 DEM5A9E.exe 33 PID 3032 wrote to memory of 2460 3032 DEM5A9E.exe 33 PID 3032 wrote to memory of 2460 3032 DEM5A9E.exe 33 PID 2460 wrote to memory of 2640 2460 DEMB09A.exe 35 PID 2460 wrote to memory of 2640 2460 DEMB09A.exe 35 PID 2460 wrote to memory of 2640 2460 DEMB09A.exe 35 PID 2460 wrote to memory of 2640 2460 DEMB09A.exe 35 PID 2640 wrote to memory of 808 2640 DEM676.exe 37 PID 2640 wrote to memory of 808 2640 DEM676.exe 37 PID 2640 wrote to memory of 808 2640 DEM676.exe 37 PID 2640 wrote to memory of 808 2640 DEM676.exe 37 PID 808 wrote to memory of 1388 808 DEM5C05.exe 39 PID 808 wrote to memory of 1388 808 DEM5C05.exe 39 PID 808 wrote to memory of 1388 808 DEM5C05.exe 39 PID 808 wrote to memory of 1388 808 DEM5C05.exe 39 PID 1388 wrote to memory of 1656 1388 DEMB2BC.exe 41 PID 1388 wrote to memory of 1656 1388 DEMB2BC.exe 41 PID 1388 wrote to memory of 1656 1388 DEMB2BC.exe 41 PID 1388 wrote to memory of 1656 1388 DEMB2BC.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\e050f9bc8dc86a9027677e536b68bb5f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e050f9bc8dc86a9027677e536b68bb5f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\DEM5A9E.exe"C:\Users\Admin\AppData\Local\Temp\DEM5A9E.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\DEMB09A.exe"C:\Users\Admin\AppData\Local\Temp\DEMB09A.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\DEM676.exe"C:\Users\Admin\AppData\Local\Temp\DEM676.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\DEM5C05.exe"C:\Users\Admin\AppData\Local\Temp\DEM5C05.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\DEMB2BC.exe"C:\Users\Admin\AppData\Local\Temp\DEMB2BC.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\DEM982.exe"C:\Users\Admin\AppData\Local\Temp\DEM982.exe"7⤵
- Executes dropped EXE
PID:1656
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5eba3caa6a36e67f3be3654646758433f
SHA18c944a3610078779632ee2839bb81ad3d2af3283
SHA256b1cf765f2f189d9bccdea6797cedaf1df374e103be53dbbd52ddafcdfdefb80f
SHA51258d063e357cc46ed24fbdc3f506ce66a0e672d2f8aeaf30d9143f791bc44f0311ef1743c97a1e56497e09d63e9e86ccb013a781ebdff400f6862d07d173eaebe
-
Filesize
15KB
MD511ce39b85d04952ba5b909dabba65c9e
SHA18999ee0849054f8a3bf3580189c9ecbaa9f16726
SHA256a46547b2939238f0a18e0f8a48c45e3ab9454452f1dad0f358feaca745980190
SHA5129214e147507fbe46293d0423f0e3c372e823d152ce1deae569405cb2ea69d0c383226c6b6cda434b40fc701d7bf1aa47eea29281b2f235fefa7bd599817681b8
-
Filesize
15KB
MD5ad76eabfb7e0718530c04618c25b6d34
SHA1bd09f48bed2fe6cdfd9a22191406a79cb6dc95c9
SHA256fb3ffba14235cb98b72569c5efdc810a6a2ba7fdc0d12b4594070da0156af3f4
SHA512e85a7d27aebe49fd5e36b9337f32b12dfa71c094481e70033ad448af016ac3d07edbf4d21ffe252308521cca570efc842979d9299c267f836459c38dea28e289
-
Filesize
15KB
MD5febf79335ce2c998b5d2a86cadd8a7c3
SHA19508fc808ebe7ac9d2eede5d2815f21bb004b1e4
SHA2566a1b19dce55e8799dbe32e0b7d4eac1734dcfdc57f1013d2236d2f2fcae47323
SHA512ad1183adabecacabac38efb619435800b070e6120feed23469ffa537acb8c13e931143274fa0ae438fc2239cb0cda0f17b360d04b39b17b67407210b11389f84
-
Filesize
15KB
MD57462577d22a4b00f65833f5ed717e7a7
SHA150e781f2a7dd0c7a0370f3db8428176fc6483e4e
SHA256cad1abf0d1a47a1c3a1bf3973bea85ae3db95774f2e78cc90a98f3c47014c6c2
SHA5125e664c855b2171e0cd35c52d4329999f726f0bed3372be901aaeab92b3c97b3d0dc2545dada82391b229019bf7d55596a7d6a07abbb3c4ec4458625b1a419518
-
Filesize
15KB
MD58bf4c3519ffab904c213b500b19522e3
SHA157bfc8e709397509be99d0ed4d579faf1199070b
SHA2562e394228da264eea1da434ba65ff401b1832695e9f2e65a1d8db7dc4d2be157b
SHA512785ff95bbc1b99ca78efe852a5d03834e0d52e99512c326bc8b6371ceb6225509688b1614aec3deecbc5449eb5ce4e9ecf849999dd1f8c61bac9dd280fdf0810