Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 04:18
Behavioral task
behavioral1
Sample
e934bbcdc92856a2f751f282b0ff56cb_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e934bbcdc92856a2f751f282b0ff56cb_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e934bbcdc92856a2f751f282b0ff56cb_JaffaCakes118.exe
-
Size
2.5MB
-
MD5
e934bbcdc92856a2f751f282b0ff56cb
-
SHA1
9bca880c11c98ea7b11ffa5c660208633cf26bf1
-
SHA256
64c9f12570909a67dd303a2f649ffe65c45333d3121174dbfa43d2d4b3888ccb
-
SHA512
9d69cc21fe4c3bb12892393ddeaddb7e3dd6e6a68135ca977f09d69d7148a1164f69ee6685c4725bc9f62224439f701b4274cbe00dec706a9baae820629a4271
-
SSDEEP
49152:frbnNP2jV1SkzPqpMIl+8qSjv/ON74NH5HUyNRcUsCVOzet0:fPYJDIcKb/O4HBUCczz9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3052 e934bbcdc92856a2f751f282b0ff56cb_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 e934bbcdc92856a2f751f282b0ff56cb_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2200 e934bbcdc92856a2f751f282b0ff56cb_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2200-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000b000000012256-12.dat upx behavioral1/memory/3052-16-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2200 e934bbcdc92856a2f751f282b0ff56cb_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2200 e934bbcdc92856a2f751f282b0ff56cb_JaffaCakes118.exe 3052 e934bbcdc92856a2f751f282b0ff56cb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 3052 2200 e934bbcdc92856a2f751f282b0ff56cb_JaffaCakes118.exe 28 PID 2200 wrote to memory of 3052 2200 e934bbcdc92856a2f751f282b0ff56cb_JaffaCakes118.exe 28 PID 2200 wrote to memory of 3052 2200 e934bbcdc92856a2f751f282b0ff56cb_JaffaCakes118.exe 28 PID 2200 wrote to memory of 3052 2200 e934bbcdc92856a2f751f282b0ff56cb_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e934bbcdc92856a2f751f282b0ff56cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e934bbcdc92856a2f751f282b0ff56cb_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\e934bbcdc92856a2f751f282b0ff56cb_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e934bbcdc92856a2f751f282b0ff56cb_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3052
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD537e28a921d5c7119df234e83ed1ed0bc
SHA1c3730eb4eb6ba0f0c29cb6b0ed10c6e3e1b94c6f
SHA2561e6e794d8f97c06882d92b21b6b0dc0f3d23b293672eaf41129e90c40f946fb3
SHA51200efc8df75ddf821b8542c6fe1105ba3427ea00fd38ed416c181a7bb43d8f49d5b818e30bb8b497905782fa8ce050ac5f9f65a0315b68839ae8c8845585d4569