Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    06/04/2024, 13:37

General

  • Target

    e2a85d470720504b32bbf1fff62a57dd_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    e2a85d470720504b32bbf1fff62a57dd

  • SHA1

    bb1bf887bc6735a85a6457c506a260ccf3a1b950

  • SHA256

    eca726c15448d6acd6c2fe034cda1f78530b42c14bbd3f96123ec907d05adad4

  • SHA512

    8bcbf858cd94685567a4520528899a8cf503d89c400825ec80a0e209f2ae350f69a3fac3da8161cb9c8f64ebfc5659a82164a855d907c29a22a33d752c896190

  • SSDEEP

    49152:Qoa1taC070dmccczQp454rEN720qEWgTFXvcmYdsM:Qoa1taC0JTm2ru720wgKt

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2a85d470720504b32bbf1fff62a57dd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e2a85d470720504b32bbf1fff62a57dd_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Users\Admin\AppData\Local\Temp\E53.tmp
      "C:\Users\Admin\AppData\Local\Temp\E53.tmp" --splashC:\Users\Admin\AppData\Local\Temp\e2a85d470720504b32bbf1fff62a57dd_JaffaCakes118.exe A33C4880D071CEF8F48E1AFB29BB836CB81A575714B4E06F50B15A5F356EC60B4CC4583037B4EAC7192D49789A03BDF018A6036925DF849A3253C60164D336EC
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2904

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\E53.tmp

    Filesize

    1.9MB

    MD5

    68f3f83e0255bcb0d2398885f14da875

    SHA1

    a5b5bb0d729b4cc52b9657607c53aefc6be07c72

    SHA256

    a675a077cd03a628343321d1c2fe42e388b01153a5ec1f6e314d42f01abb81d5

    SHA512

    bc7d6e259dc746983e11c326380417bb29e135280a97c027d97ad704273b8cde1fe86a86c1913e9d683c2ff317d29cdc908883ef70c0a896cc1101569efb4cc6

  • memory/1664-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2904-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB