Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
edc95bf4fb6999f8ee95f9445d3ea6bf_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
edc95bf4fb6999f8ee95f9445d3ea6bf_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
edc95bf4fb6999f8ee95f9445d3ea6bf_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
edc95bf4fb6999f8ee95f9445d3ea6bf
-
SHA1
31ef3a0eb35ae90deb646303470b955088b6afac
-
SHA256
b7e3fe7b4a63a80ab2a7ec1f9da98740c723f96c0b423cef4aa4e08ab63047ab
-
SHA512
4dcab35b9c9e4800bfac755dfef66a2884bbf0735ec9ca595288790520c136693b982274333a57a62c74a051af8e6e0f24b50cb599afc210fad9680cfb26ab56
-
SSDEEP
24576:Eb5kSYaLTVlj4w2IGmwfMC50zi8IANU2oXt6Ry5PFayDPkwPLj9TY2LvAyuZxM:Eb5k2L5j2bmwf9N8MDXwkNMyDP3jVchM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3036 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2128 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2980 edc95bf4fb6999f8ee95f9445d3ea6bf_JaffaCakes118.exe 2980 edc95bf4fb6999f8ee95f9445d3ea6bf_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2980 edc95bf4fb6999f8ee95f9445d3ea6bf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2980 wrote to memory of 3036 2980 edc95bf4fb6999f8ee95f9445d3ea6bf_JaffaCakes118.exe 28 PID 2980 wrote to memory of 3036 2980 edc95bf4fb6999f8ee95f9445d3ea6bf_JaffaCakes118.exe 28 PID 2980 wrote to memory of 3036 2980 edc95bf4fb6999f8ee95f9445d3ea6bf_JaffaCakes118.exe 28 PID 3036 wrote to memory of 2128 3036 cmd.exe 30 PID 3036 wrote to memory of 2128 3036 cmd.exe 30 PID 3036 wrote to memory of 2128 3036 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\edc95bf4fb6999f8ee95f9445d3ea6bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edc95bf4fb6999f8ee95f9445d3ea6bf_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\edc95bf4fb6999f8ee95f9445d3ea6bf_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2128
-
-