Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/04/2024, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
e58d072800a8d89cea931fa784aaa899_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e58d072800a8d89cea931fa784aaa899_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e58d072800a8d89cea931fa784aaa899_JaffaCakes118.exe
-
Size
5.1MB
-
MD5
e58d072800a8d89cea931fa784aaa899
-
SHA1
2f493844a5f9cd9cec7a9e0d8e388921069809e7
-
SHA256
e36f85b380fcff0dcee090f7f4397efcc60f8663e9b36b39ce8c08d2c618e0a4
-
SHA512
07a3e3f87bb2b62f179a5e43d6445c256cb546d439d6f0f978af9c86c6b34d030af0e5d4a2349c1927f03d3252c7ed2aa65b4d646d37258e5bb2089e22acc302
-
SSDEEP
98304:aCGlhlpTYpPDQv2mmb5UJgJN2lxD5jvK9aRZ0997GQahplj/xF95ZNMOYBb8LBIZ:y38fmmbVJN2lXLKkD0j7sLN/VyBIXIm4
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Wapp = "C:\\Arquivos de programas\\Wapp.exe" e58d072800a8d89cea931fa784aaa899_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\system\Next.txt e58d072800a8d89cea931fa784aaa899_JaffaCakes118.exe File created C:\Windows\Menu Iniciar\Iniciar\Wapp.exe e58d072800a8d89cea931fa784aaa899_JaffaCakes118.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3036 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1940 e58d072800a8d89cea931fa784aaa899_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 3036 1940 e58d072800a8d89cea931fa784aaa899_JaffaCakes118.exe 28 PID 1940 wrote to memory of 3036 1940 e58d072800a8d89cea931fa784aaa899_JaffaCakes118.exe 28 PID 1940 wrote to memory of 3036 1940 e58d072800a8d89cea931fa784aaa899_JaffaCakes118.exe 28 PID 1940 wrote to memory of 3036 1940 e58d072800a8d89cea931fa784aaa899_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e58d072800a8d89cea931fa784aaa899_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e58d072800a8d89cea931fa784aaa899_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn startt /tr c:\autoexec.bat /sc onstart /ru system2⤵
- Creates scheduled task(s)
PID:3036
-