Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
f5cbd2db2f3cb4c4fb69f4b27d7b574f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f5cbd2db2f3cb4c4fb69f4b27d7b574f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f5cbd2db2f3cb4c4fb69f4b27d7b574f_JaffaCakes118.exe
-
Size
16KB
-
MD5
f5cbd2db2f3cb4c4fb69f4b27d7b574f
-
SHA1
6368de0a11fa988a7a40c9dc57e3f564bc95e0ce
-
SHA256
5d7377fc6ddbf0f1d13bf431d7d5140173ea6af64ef67ec7dac2e3dab69d72a7
-
SHA512
ef50f6b004a878436c5b8b39cc36ed662cb372f5798739e21309ba481fca26b94421fc02a4ca9862190db242e425d799d303a3042c717afa1c09873d69b2af45
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYyOB:hDXWipuE+K3/SSHgxmyOB
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2620 DEM4BDF.exe 3064 DEMA3ED.exe 2708 DEMF9BA.exe 1860 DEM5013.exe 1176 DEMA62E.exe 2276 DEMFC2A.exe -
Loads dropped DLL 6 IoCs
pid Process 2176 f5cbd2db2f3cb4c4fb69f4b27d7b574f_JaffaCakes118.exe 2620 DEM4BDF.exe 3064 DEMA3ED.exe 2708 DEMF9BA.exe 1860 DEM5013.exe 1176 DEMA62E.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2620 2176 f5cbd2db2f3cb4c4fb69f4b27d7b574f_JaffaCakes118.exe 29 PID 2176 wrote to memory of 2620 2176 f5cbd2db2f3cb4c4fb69f4b27d7b574f_JaffaCakes118.exe 29 PID 2176 wrote to memory of 2620 2176 f5cbd2db2f3cb4c4fb69f4b27d7b574f_JaffaCakes118.exe 29 PID 2176 wrote to memory of 2620 2176 f5cbd2db2f3cb4c4fb69f4b27d7b574f_JaffaCakes118.exe 29 PID 2620 wrote to memory of 3064 2620 DEM4BDF.exe 33 PID 2620 wrote to memory of 3064 2620 DEM4BDF.exe 33 PID 2620 wrote to memory of 3064 2620 DEM4BDF.exe 33 PID 2620 wrote to memory of 3064 2620 DEM4BDF.exe 33 PID 3064 wrote to memory of 2708 3064 DEMA3ED.exe 35 PID 3064 wrote to memory of 2708 3064 DEMA3ED.exe 35 PID 3064 wrote to memory of 2708 3064 DEMA3ED.exe 35 PID 3064 wrote to memory of 2708 3064 DEMA3ED.exe 35 PID 2708 wrote to memory of 1860 2708 DEMF9BA.exe 37 PID 2708 wrote to memory of 1860 2708 DEMF9BA.exe 37 PID 2708 wrote to memory of 1860 2708 DEMF9BA.exe 37 PID 2708 wrote to memory of 1860 2708 DEMF9BA.exe 37 PID 1860 wrote to memory of 1176 1860 DEM5013.exe 39 PID 1860 wrote to memory of 1176 1860 DEM5013.exe 39 PID 1860 wrote to memory of 1176 1860 DEM5013.exe 39 PID 1860 wrote to memory of 1176 1860 DEM5013.exe 39 PID 1176 wrote to memory of 2276 1176 DEMA62E.exe 41 PID 1176 wrote to memory of 2276 1176 DEMA62E.exe 41 PID 1176 wrote to memory of 2276 1176 DEMA62E.exe 41 PID 1176 wrote to memory of 2276 1176 DEMA62E.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5cbd2db2f3cb4c4fb69f4b27d7b574f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5cbd2db2f3cb4c4fb69f4b27d7b574f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\DEM4BDF.exe"C:\Users\Admin\AppData\Local\Temp\DEM4BDF.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\DEMA3ED.exe"C:\Users\Admin\AppData\Local\Temp\DEMA3ED.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\DEMF9BA.exe"C:\Users\Admin\AppData\Local\Temp\DEMF9BA.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\DEM5013.exe"C:\Users\Admin\AppData\Local\Temp\DEM5013.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\DEMA62E.exe"C:\Users\Admin\AppData\Local\Temp\DEMA62E.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\DEMFC2A.exe"C:\Users\Admin\AppData\Local\Temp\DEMFC2A.exe"7⤵
- Executes dropped EXE
PID:2276
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD595b2ce0199fcde47f5442ec3b8d4dcb5
SHA1953b82c003a81e622e7c97b7e7100e1b6a246bfd
SHA256a09d2073ddca9938df2cf7e43c0b12fdba99a85cfa58b7dca02f955d611e7540
SHA512da6cdbbee2b7440109fcd284a417dfe225f820ffc49b38e51b082dd2c0c9d655e75e757ffc00c4118a385114ed65fa6b9e18f32c49a5209ffa5eaf6b592726a7
-
Filesize
16KB
MD59f56f17d1b88aea3e363b26ededbc4f3
SHA186721022b0296860d53ffbad292b7530fc0b9179
SHA256dd78d01d47f369c8ad75ccdea6a5bff888a6e419f56836eeaf13ae8e5f5e21e1
SHA512ff55a4703f44b3460ed2ac19efbb7396baefa4615b7ababbf6e75b6630ac03946b3564a0635b4621a4966685a8fb6a8716c68c027045b63505f0728d04eb1ad2
-
Filesize
16KB
MD5ffb301c4038484d798f9963ddcf9f312
SHA1f366316e62c51fc1acd94250ae2fbec7e6a93267
SHA2560aac10c1c1e54a49f9b15b38515a5ecd8322116a1911fbdae46a188287dd8270
SHA512e4339553f9aecf2aa5b46099351e226f357c974539aa079eb449ba6f7c2fbd6b52fc73c77d872189810edf9512578fbf55e7ce8362d7eb56c995346d7540f5ea
-
Filesize
16KB
MD5dbb07f89e83c8af0f9b962f1c770e097
SHA11050d1b6abce7c3438759e0114376404b63b35df
SHA2560236dc07ea630e73254c4bd6fe0ed4f8e0d9b253b2240d8891090295e36fc285
SHA512fc5574020203d146fd0685243a20c95fac8f29e20db2ffdafb96311cb8a6cabdc9e425c6faa3151fe24eb866e9c63f307bbcff4f40c5953a74c24005fd90eecc
-
Filesize
16KB
MD54d6df0cf6b31152596c24521c60daa4b
SHA1993cc872d6b5a574e698fb7ed2f957ec208cd707
SHA25694cc6a98f1a2770e7c53fe20ccf4fafe1c7edb48b3400662911a85877623e347
SHA512778cf5f7f7c7efe1fc1ab7b951be5f81391481e54c6eaae556d4037f668f8b20f75a2e91c1c0ec3a5ce9a85e913a505b1877433ddf5adc61481814701df3476c
-
Filesize
16KB
MD5db25b42920cd2f92954e946cf8e981e7
SHA117575ce387900a9742745d2a2675930c7e7730a0
SHA256e218c26772fdfed68f4067d713caac743d871ec67e3afbfc23cb3379c888b334
SHA512e6fdb29576e5a0ad8aae8cdbe86d448381a94130772d9ec33493102e8913ddf2c562262eef5eef8e4548b2216811c87d852e42aa30860cfb296cdca6b07e9847