Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe
-
Size
247KB
-
MD5
f234e1d047588d72175f6510ddaf726c
-
SHA1
45f7dabaa03be229c8b6e32b78b07e68c363d7f5
-
SHA256
b333cc80d09dc553855ddeaa5c82848fb4735d97ad666f0f95abf431f1868c8b
-
SHA512
8617a2242884f2426f0b74df4986a366b19c7ae69008651bfd588622d0ab096736978ef6fa4c03c295fd921b3dacbaaf6a106d5797eb9a5b34413c2ac49cd585
-
SSDEEP
3072:PDaJiGcR+aGTSFq0XT7q8uxJK1met5AomHNWv3JPTPAF9mrLzPSilciWoq:P2JiGcR3XMhpJO56NG3VT88rLzPS66
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2060 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2732 asaacidm.exe -
Loads dropped DLL 4 IoCs
pid Process 2060 cmd.exe 2060 cmd.exe 2732 asaacidm.exe 2732 asaacidm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 3036 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2640 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2732 asaacidm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3036 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2732 asaacidm.exe 2732 asaacidm.exe 2732 asaacidm.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2732 asaacidm.exe 2732 asaacidm.exe 2732 asaacidm.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2060 2276 f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2060 2276 f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2060 2276 f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2060 2276 f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe 28 PID 2060 wrote to memory of 3036 2060 cmd.exe 30 PID 2060 wrote to memory of 3036 2060 cmd.exe 30 PID 2060 wrote to memory of 3036 2060 cmd.exe 30 PID 2060 wrote to memory of 3036 2060 cmd.exe 30 PID 2060 wrote to memory of 2640 2060 cmd.exe 32 PID 2060 wrote to memory of 2640 2060 cmd.exe 32 PID 2060 wrote to memory of 2640 2060 cmd.exe 32 PID 2060 wrote to memory of 2640 2060 cmd.exe 32 PID 2060 wrote to memory of 2732 2060 cmd.exe 33 PID 2060 wrote to memory of 2732 2060 cmd.exe 33 PID 2060 wrote to memory of 2732 2060 cmd.exe 33 PID 2060 wrote to memory of 2732 2060 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2276 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe" & start C:\Users\Admin\AppData\Local\asaacidm.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 22763⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:2640
-
-
C:\Users\Admin\AppData\Local\asaacidm.exeC:\Users\Admin\AppData\Local\asaacidm.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247KB
MD5f234e1d047588d72175f6510ddaf726c
SHA145f7dabaa03be229c8b6e32b78b07e68c363d7f5
SHA256b333cc80d09dc553855ddeaa5c82848fb4735d97ad666f0f95abf431f1868c8b
SHA5128617a2242884f2426f0b74df4986a366b19c7ae69008651bfd588622d0ab096736978ef6fa4c03c295fd921b3dacbaaf6a106d5797eb9a5b34413c2ac49cd585