Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 17:02
Static task
static1
Behavioral task
behavioral1
Sample
f64124e54f26d9646d5d0cd36d6c8f39_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f64124e54f26d9646d5d0cd36d6c8f39_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f64124e54f26d9646d5d0cd36d6c8f39_JaffaCakes118.exe
-
Size
374KB
-
MD5
f64124e54f26d9646d5d0cd36d6c8f39
-
SHA1
26de96e4ea12032414a9546ccd87f771a01a4aae
-
SHA256
0534f8a42cd99465ecc9f18b6a0e218070b696fb06165e903d410ffee4539381
-
SHA512
952dc33e300c4273f5b57998d1be81eecf71941a7bdbeea11796f1e0666afd317881fbe3ddb5b240526be1ec4f57a3d9f3e041295dc959c154d73093402aa504
-
SSDEEP
6144:FD2EyjT0EjAXn+JiFCMH1UY3+zQO6gO7w8nXi5Ezd3qg01clrFcmfszXUxnCf7:cxjsn+JiFCMH1UY3sf6x7fny58xBlrFg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2572 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2800 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2572 3020 f64124e54f26d9646d5d0cd36d6c8f39_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2572 3020 f64124e54f26d9646d5d0cd36d6c8f39_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2572 3020 f64124e54f26d9646d5d0cd36d6c8f39_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2572 3020 f64124e54f26d9646d5d0cd36d6c8f39_JaffaCakes118.exe 30 PID 2572 wrote to memory of 2800 2572 cmd.exe 32 PID 2572 wrote to memory of 2800 2572 cmd.exe 32 PID 2572 wrote to memory of 2800 2572 cmd.exe 32 PID 2572 wrote to memory of 2800 2572 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f64124e54f26d9646d5d0cd36d6c8f39_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f64124e54f26d9646d5d0cd36d6c8f39_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\f64124e54f26d9646d5d0cd36d6c8f39_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2800
-
-