Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 13:29
Behavioral task
behavioral1
Sample
e790e9a8eb8ec6dd192b67ae674b2ef7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e790e9a8eb8ec6dd192b67ae674b2ef7_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
e790e9a8eb8ec6dd192b67ae674b2ef7_JaffaCakes118.exe
-
Size
9KB
-
MD5
e790e9a8eb8ec6dd192b67ae674b2ef7
-
SHA1
164f31cad6f17b0fc38b2222384e86c6f87165b8
-
SHA256
d2804b394ed127a1d11736446f3731e2d12416cf14cd2471bea5b1cd8280b028
-
SHA512
3f1b64dc96ae000e25ed872d569d63c0263568176b7f93fa0428516ed0e05ba83846bebaa7c622ce5df2ac472fc967b75ce532ce1524bdbe4258f3501cf335a3
-
SSDEEP
96:l1Nnvlo+JkGoEpyr1v1d8RE2TH7e8l3L8Bl3gBnFubTdpJlgUJ3rwZmad9ljC1Ws:RnvpKSyr1v38zLoHwuPdpJ33qvd9uT
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run e790e9a8eb8ec6dd192b67ae674b2ef7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\this = "C:\\Users\\Admin\\AppData\\Local\\Temp\\e790e9a8eb8ec6dd192b67ae674b2ef7_JaffaCakes118.exe" e790e9a8eb8ec6dd192b67ae674b2ef7_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1756-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1756-1-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1756 wrote to memory of 1820 1756 e790e9a8eb8ec6dd192b67ae674b2ef7_JaffaCakes118.exe 28 PID 1756 wrote to memory of 1820 1756 e790e9a8eb8ec6dd192b67ae674b2ef7_JaffaCakes118.exe 28 PID 1756 wrote to memory of 1820 1756 e790e9a8eb8ec6dd192b67ae674b2ef7_JaffaCakes118.exe 28 PID 1756 wrote to memory of 1820 1756 e790e9a8eb8ec6dd192b67ae674b2ef7_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e790e9a8eb8ec6dd192b67ae674b2ef7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e790e9a8eb8ec6dd192b67ae674b2ef7_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe2⤵PID:1820
-