Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 22:42
Static task
static1
Behavioral task
behavioral1
Sample
ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
ec25e8234d9cf1388a2d97407d845b01
-
SHA1
0cd7ab43fc060557525ae08a8b0a91a8f4f1fdab
-
SHA256
e9afb4c74de6824360cdc805a33948c83fd3624ea4fbfd61bbf66314eb77a294
-
SHA512
2b870d279522389b281f4db334cc3d1e2b683aa527100d06fd961173da7b5b0124f14de778f38e341efea4f59abca8db34eb30884f6376a761000486adca66f1
-
SSDEEP
49152:0vKyrl7qkuiN0FnnHMvq/IXxsheEnotfw23SZ:0v/rl27nnn7AXxA6faZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2572 Ko2FuckOff.exe -
Loads dropped DLL 1 IoCs
pid Process 856 ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 856 wrote to memory of 2056 856 ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe 28 PID 856 wrote to memory of 2056 856 ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe 28 PID 856 wrote to memory of 2056 856 ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe 28 PID 856 wrote to memory of 2056 856 ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe 28 PID 856 wrote to memory of 2056 856 ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe 28 PID 856 wrote to memory of 2056 856 ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe 28 PID 856 wrote to memory of 2056 856 ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe 28 PID 856 wrote to memory of 2092 856 ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe 30 PID 856 wrote to memory of 2092 856 ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe 30 PID 856 wrote to memory of 2092 856 ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe 30 PID 856 wrote to memory of 2092 856 ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe 30 PID 856 wrote to memory of 2572 856 ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe 31 PID 856 wrote to memory of 2572 856 ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe 31 PID 856 wrote to memory of 2572 856 ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe 31 PID 856 wrote to memory of 2572 856 ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe 31 PID 2056 wrote to memory of 2768 2056 cmd.exe 32 PID 2056 wrote to memory of 2768 2056 cmd.exe 32 PID 2056 wrote to memory of 2768 2056 cmd.exe 32 PID 2056 wrote to memory of 2768 2056 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\winupdate.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\cmd.execmd /c copy "C:\Users\Admin\AppData\Local\Temp\ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\\usnscv.exe"3⤵PID:2768
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2092
-
-
C:\Users\Admin\AppData\Local\Ko2FuckOff.exe"C:\Users\Admin\AppData\Local\Ko2FuckOff.exe"2⤵
- Executes dropped EXE
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
403KB
MD5776a250f66356e53bd5c094e197a5b3a
SHA1b37b51b66c8d5300eb8b6671fd9a88d8fa33e7c8
SHA256cd7768e7c3f1cd83af4d12e6ce1de373ea792d6a0de53f68dd5ba66bb6cec46d
SHA5126317fe647dec807e3e072ede791a7bded7e32580271fd141a03c3b2a9f31a7766ce82320e5c36c7cd3bbb93edd7c95a44809aa62fb68c30500b58f611700c443
-
Filesize
162B
MD5f4628bd71ad81679e8e7824737478fa6
SHA1c25c088af824cf653b7a9c9cff7ced4d9f53c3ae
SHA256eb38a61d889818ad5a6a5d3e229b0fcb8561f6b3889cb1386e9af815aaa1f975
SHA512afc4f3e1b6b14526620f71ee6ee49412422bded7f0f0afffcd8bf838d7f9a824764f86262b2075745a395f4f5c632bdf2fbbe4d806edaaa8b67bcad995228dfb