Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/04/2024, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
e1ff12325b19dca11adab02b8059de8a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1ff12325b19dca11adab02b8059de8a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e1ff12325b19dca11adab02b8059de8a_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
e1ff12325b19dca11adab02b8059de8a
-
SHA1
7f97d77be09994cb3025b6ef2f29a479d7db957f
-
SHA256
07fa7cc32653d99f81d4bc4c479a19528486643c3ae238de9614af9dd93ca68f
-
SHA512
b8392a83de4c8afe23d95f14bca5ef0fd9bd1d6daf1866122c0d3692ecb573f9a1c426e547dd861e3833d9147078ed3dbe01e4e4986a6ed233a3c0b3107b2d80
-
SSDEEP
49152:Qoa1taC070d/mBgrcJ0PTPOYqHHtBj0uc+hJ+lFo+idlc3k:Qoa1taC0rBg42PTPpqHNBLc+oFmdlCk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2368 144C.tmp -
Executes dropped EXE 1 IoCs
pid Process 2368 144C.tmp -
Loads dropped DLL 1 IoCs
pid Process 2876 e1ff12325b19dca11adab02b8059de8a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2368 2876 e1ff12325b19dca11adab02b8059de8a_JaffaCakes118.exe 28 PID 2876 wrote to memory of 2368 2876 e1ff12325b19dca11adab02b8059de8a_JaffaCakes118.exe 28 PID 2876 wrote to memory of 2368 2876 e1ff12325b19dca11adab02b8059de8a_JaffaCakes118.exe 28 PID 2876 wrote to memory of 2368 2876 e1ff12325b19dca11adab02b8059de8a_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1ff12325b19dca11adab02b8059de8a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1ff12325b19dca11adab02b8059de8a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\144C.tmp"C:\Users\Admin\AppData\Local\Temp\144C.tmp" --splashC:\Users\Admin\AppData\Local\Temp\e1ff12325b19dca11adab02b8059de8a_JaffaCakes118.exe 239C29C37EBEF9F5C0669E1965A707E2F0D5DF2FEBAC97A8E4F68749FEDF64FF290839FBACEEC684EAC38EB464AC4718AA11EBCF2CC362DE151C57B58C6955332⤵
- Deletes itself
- Executes dropped EXE
PID:2368
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5d70b9c44e6e1ae5dce0ce1e47694101d
SHA1c4b819e214d752a75aeba2f7b83236cc7272a8da
SHA2564e3c148cef54ce4991336c4d1a6dbdf884c76e2467c9f102949c7b02ac5feddd
SHA5126643b5da5645d82f74837fa7c8e3160289541c3ae472927e560080e49c365251255f4c58287b0d7e7c53a2742511107a0d04103a850b179e43738801dbca9d86