Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 03:51
Static task
static1
Behavioral task
behavioral1
Sample
f971641b23bc38618087e8966a32b138_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f971641b23bc38618087e8966a32b138_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f971641b23bc38618087e8966a32b138_JaffaCakes118.exe
-
Size
316KB
-
MD5
f971641b23bc38618087e8966a32b138
-
SHA1
5e783068efa19840872dc6d554b2157f518a7abf
-
SHA256
43dc4f7818620010164a9056c1c9899d19eb827d37dd570f5db7ced9bc0f8573
-
SHA512
eeb347fd002975c2a8bf4def4e6b28f69c917522d22d6ab5e0f4493c9539b890ae8085f4b45414ed083b2dbc35045bd7043d22a3034d507e53bbc073e99be05e
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiE5u1Bh7xeSyZho:FytbV3kSoXaLnTosl6urOXTo
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3052 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2948 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2848 f971641b23bc38618087e8966a32b138_JaffaCakes118.exe 2848 f971641b23bc38618087e8966a32b138_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2848 f971641b23bc38618087e8966a32b138_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2848 wrote to memory of 3052 2848 f971641b23bc38618087e8966a32b138_JaffaCakes118.exe 28 PID 2848 wrote to memory of 3052 2848 f971641b23bc38618087e8966a32b138_JaffaCakes118.exe 28 PID 2848 wrote to memory of 3052 2848 f971641b23bc38618087e8966a32b138_JaffaCakes118.exe 28 PID 3052 wrote to memory of 2948 3052 cmd.exe 30 PID 3052 wrote to memory of 2948 3052 cmd.exe 30 PID 3052 wrote to memory of 2948 3052 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f971641b23bc38618087e8966a32b138_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f971641b23bc38618087e8966a32b138_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\f971641b23bc38618087e8966a32b138_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2948
-
-