Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe
-
Size
199KB
-
MD5
fb4683c057c42b98351707c3e7191ac0
-
SHA1
337a0e63086cbfc2dd1cbf73d99ea5419ab07304
-
SHA256
cab8207f49b7f4d82e264c60e5a70b902e5e27b8a8905e58ad10e72aab3c7d08
-
SHA512
3fae8953327deaaa96d0c87bbf8777355be7ca3eb2cfdd60ead793d0efe3542b2250c887437c1cca0d5b6570d1e0a658821d9adbd6cac0ba106e80aa9ecdfdec
-
SSDEEP
6144:lnqujU/i1qUaw2HEg+TuDTiWns0hN7rBLP8Nh/j:lpjQi1qxXkRYiWns0/md
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2776 explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 2772 mdwqmyg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2004 set thread context of 2776 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 29 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\mdwqmyg.exe fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe File opened for modification C:\Windows\mdwqmyg.exe fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe 2772 mdwqmyg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2772 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 28 PID 2004 wrote to memory of 2772 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 28 PID 2004 wrote to memory of 2772 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 28 PID 2004 wrote to memory of 2772 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 28 PID 2004 wrote to memory of 2776 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 29 PID 2004 wrote to memory of 2776 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 29 PID 2004 wrote to memory of 2776 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 29 PID 2004 wrote to memory of 2776 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 29 PID 2772 wrote to memory of 1208 2772 mdwqmyg.exe 21 PID 2004 wrote to memory of 2776 2004 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 29 PID 2772 wrote to memory of 1208 2772 mdwqmyg.exe 21 PID 2772 wrote to memory of 1208 2772 mdwqmyg.exe 21 PID 2772 wrote to memory of 1208 2772 mdwqmyg.exe 21 PID 2772 wrote to memory of 1208 2772 mdwqmyg.exe 21 PID 2772 wrote to memory of 1208 2772 mdwqmyg.exe 21 PID 2772 wrote to memory of 1208 2772 mdwqmyg.exe 21 PID 2772 wrote to memory of 1208 2772 mdwqmyg.exe 21 PID 2772 wrote to memory of 1208 2772 mdwqmyg.exe 21 PID 2772 wrote to memory of 1208 2772 mdwqmyg.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\mdwqmyg.exeC:\Windows\mdwqmyg.exe a3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Deletes itself
PID:2776
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199KB
MD5e8dde0d0196812c803d1637e6c8ab059
SHA1278e150cccca293109f3f8e502bc5bd7560a4191
SHA256635cb18b93ae8f3e0f529e9de94b857c6fc662dd505919277d3657e91f8df2c1
SHA51237777f4057c904955468168740f7ebc0ba0a361db109c8f6d385d82dc1732661d76fc9ddd8243cd9a97c2a0caf09cf2368dc8649fe3d7ab3ad6547076a0eda80