Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 20:31
Behavioral task
behavioral1
Sample
e8598d4a260b9a096dba45991f1b8f7e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e8598d4a260b9a096dba45991f1b8f7e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e8598d4a260b9a096dba45991f1b8f7e_JaffaCakes118.exe
-
Size
16KB
-
MD5
e8598d4a260b9a096dba45991f1b8f7e
-
SHA1
8fb70fdcb032a29046f4916206cc6091317c372e
-
SHA256
00563c6251c7b76563613fa38ea74faaea8baf25e155f2a0b45e3f6a777cfbeb
-
SHA512
70f04a3bae94ad0a0431fec4b125110c3607ae54ca6413f16a0ad1e1e9f8a4c667a2a3c08b7e575ece2181db67cbb6c5baea8da996e2a3cce2c29cf526da4448
-
SSDEEP
384:Rbb3jVuE71pYcYeI0jdnm2nH0sOV5JItO8x4pHb8:Zn4M1ycYa5HNtqq
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2176-0-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2176-3-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2176-4-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2176-5-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2176-6-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2176-7-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2176-8-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2176-9-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2176-10-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2176-11-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2176-12-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2176-13-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2176-14-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2176-15-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2176-16-0x0000000000400000-0x0000000000457000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AntyVirK = "c:\\windows\\antyvirk.exe ukrt " e8598d4a260b9a096dba45991f1b8f7e_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created \??\c:\windows\antyvirk.exe e8598d4a260b9a096dba45991f1b8f7e_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 e8598d4a260b9a096dba45991f1b8f7e_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2176 e8598d4a260b9a096dba45991f1b8f7e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8598d4a260b9a096dba45991f1b8f7e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8598d4a260b9a096dba45991f1b8f7e_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2176