Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 16:15
Static task
static1
Behavioral task
behavioral1
Sample
f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
f1778e10ebe79d43824716896d407a07
-
SHA1
ec03537af042f6fc51b2b6cfb87107e09f22f6a6
-
SHA256
debf9ef658a9abcc44b0d3e2d4949a2bc5f46d85c4ce44a1ad5c93c329ed62a2
-
SHA512
a8aaf3167a1f85bb287abb94262231bec92a8ea9817445f411a5f6c81e88eeccb749a74167dc9d8ec9aab31c19bd3926297f8586a3c5e5d89866be371f940d69
-
SSDEEP
24576:AhOsBgo0q4wMfBmCmTOUd+L6kvXWcr539JcsjEwJQwyRVBT:AYoHMpmCm6Ud+zvXPr539Tj7mwypT
Malware Config
Extracted
xloader
2.3
rqe8
bjft.net
abrosnm3.com
badlistens.com
signal-japan.com
schaka.com
kingdompersonalbranding.com
sewmenship.com
lzproperty.com
mojoimpacthosting.com
carinsurancecoverage.care
corporatemercadona.com
mobileswash.com
forevercelebration2026.com
co-het.com
bellesherlou.com
commentsoldgolf.com
onlytwod.group
utesco.info
martstrip.com
onszdgu.icu
progress-ai.com
flood-pictures.com
theyerpa.com
roicjhy.icu
have-boyscout-yg.com
neosimplerack.com
foofloin.com
nielsentrust.com
digitalwt.com
astaxanthinsaveme.com
hashseries.com
asesoriasyh.com
sun5new.com
domain-here.com
joshuasklarvoices.com
thecoregr.com
dreamstatebedding.com
archostekton.com
10612crestondr.com
wallfeez.com
azamdairy.com
allied-products.com
jingxinlt.com
sometingwild.com
timhafun.net
meesowell.com
betteryou999.com
theslut.net
lifewithken.com
workhardrrhh.com
meatbeoff.com
influencerflywheel.com
qzzstz.com
toewsontherun.com
esperienzahotels.com
codemybm.com
medanchess.com
greenfeltfox.com
towinggodfreyil.net
gamersgangbd.com
move-views.com
spezialitat.com
dreammyteepe.com
sheltoncannabis.com
steveblexrud.com
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/1664-3-0x00000000003C0000-0x00000000003D2000-memory.dmp CustAttr -
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2400-14-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1664 set thread context of 2400 1664 f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2400 f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2400 1664 f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe 30 PID 1664 wrote to memory of 2400 1664 f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe 30 PID 1664 wrote to memory of 2400 1664 f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe 30 PID 1664 wrote to memory of 2400 1664 f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe 30 PID 1664 wrote to memory of 2400 1664 f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe 30 PID 1664 wrote to memory of 2400 1664 f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe 30 PID 1664 wrote to memory of 2400 1664 f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2400
-