Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 11:40
Static task
static1
Behavioral task
behavioral1
Sample
ed55f2adbd6611600bd16c334f910e87_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ed55f2adbd6611600bd16c334f910e87_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
ed55f2adbd6611600bd16c334f910e87_JaffaCakes118.exe
-
Size
9KB
-
MD5
ed55f2adbd6611600bd16c334f910e87
-
SHA1
a837bab7fe45135460c85e5483d03b59c225dde7
-
SHA256
4aefe914b1c184a0d111cc43d79e8aa6937e27135b73d3e13bc550bb695bc10a
-
SHA512
3b04d6611f95516e153484364d90d18349aca6bce25a09d24e0df905004d90bf18c942362d7f9ada83b990accccb93a90a2fcd8d95d4ba00f500e4945a43b0ae
-
SSDEEP
192:5BksuzPY82gQv5F42HtNeMZZ3+93VnjdwCzp3L7Ej:X82l40tNeMyFnhwCNXE
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1624 ed55f2adbd6611600bd16c334f910e87_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2576 1624 ed55f2adbd6611600bd16c334f910e87_JaffaCakes118.exe 28 PID 1624 wrote to memory of 2576 1624 ed55f2adbd6611600bd16c334f910e87_JaffaCakes118.exe 28 PID 1624 wrote to memory of 2576 1624 ed55f2adbd6611600bd16c334f910e87_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed55f2adbd6611600bd16c334f910e87_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed55f2adbd6611600bd16c334f910e87_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1624 -s 8962⤵PID:2576
-