Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 07:07
Static task
static1
Behavioral task
behavioral1
Sample
f53f5748e3828c9a8dad847fdb9d0243_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f53f5748e3828c9a8dad847fdb9d0243_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f53f5748e3828c9a8dad847fdb9d0243_JaffaCakes118.exe
-
Size
488KB
-
MD5
f53f5748e3828c9a8dad847fdb9d0243
-
SHA1
07ccff8064e93eaff0129b2a57eaa22a1276c454
-
SHA256
8119549297750b84fd05bb7ff86cc787e29100d0f448071e123a9acc4c085d72
-
SHA512
31c0b701d10b7f39afa319b1ac0b8cd6cb567e8c14230a44b825606d47681cc0846d5ebd2e16a3f4c721fbfb1f1da240f877afe64b9e1617e1fcb2806e415e13
-
SSDEEP
12288:FytbV3kSoXaLnToslhggcU1vVzqYA+7PRVWM:Eb5kSYaLTVlhggcU3VWM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1524 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1636 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1432 f53f5748e3828c9a8dad847fdb9d0243_JaffaCakes118.exe 1432 f53f5748e3828c9a8dad847fdb9d0243_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1432 f53f5748e3828c9a8dad847fdb9d0243_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1432 wrote to memory of 1524 1432 f53f5748e3828c9a8dad847fdb9d0243_JaffaCakes118.exe 28 PID 1432 wrote to memory of 1524 1432 f53f5748e3828c9a8dad847fdb9d0243_JaffaCakes118.exe 28 PID 1432 wrote to memory of 1524 1432 f53f5748e3828c9a8dad847fdb9d0243_JaffaCakes118.exe 28 PID 1524 wrote to memory of 1636 1524 cmd.exe 30 PID 1524 wrote to memory of 1636 1524 cmd.exe 30 PID 1524 wrote to memory of 1636 1524 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f53f5748e3828c9a8dad847fdb9d0243_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f53f5748e3828c9a8dad847fdb9d0243_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\f53f5748e3828c9a8dad847fdb9d0243_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1636
-
-