Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
fe74f1e6fc03b67e02fb542d5a029fd0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe74f1e6fc03b67e02fb542d5a029fd0_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fe74f1e6fc03b67e02fb542d5a029fd0_JaffaCakes118.exe
-
Size
74KB
-
MD5
fe74f1e6fc03b67e02fb542d5a029fd0
-
SHA1
deed79314ac40e4ea375bdb23d3e702b6d7a675e
-
SHA256
cffc59e524612c1d6e049e3051b9fbbee19a7d0b06fe78ea6f74fda8cb02bd39
-
SHA512
23a073789c5aa084e1adb0e4b1cb5819d57107e5fd889b9655483c2bca2cf93f84f079242fc4494e389c430f4d6f683a09f3afd2b507fa000d1778eec121e082
-
SSDEEP
1536:zI7MUUJPSFI4nmXsXCre0E9aMKkcTeLgQOicy88888888888888888888:U7MUsSFIh9z8a3Tvb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1716 msgmr.exe -
Loads dropped DLL 6 IoCs
pid Process 2020 fe74f1e6fc03b67e02fb542d5a029fd0_JaffaCakes118.exe 2020 fe74f1e6fc03b67e02fb542d5a029fd0_JaffaCakes118.exe 2788 WerFault.exe 2788 WerFault.exe 2788 WerFault.exe 2788 WerFault.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msgmr.exe fe74f1e6fc03b67e02fb542d5a029fd0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msgmr.exe fe74f1e6fc03b67e02fb542d5a029fd0_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2788 1716 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1716 2020 fe74f1e6fc03b67e02fb542d5a029fd0_JaffaCakes118.exe 28 PID 2020 wrote to memory of 1716 2020 fe74f1e6fc03b67e02fb542d5a029fd0_JaffaCakes118.exe 28 PID 2020 wrote to memory of 1716 2020 fe74f1e6fc03b67e02fb542d5a029fd0_JaffaCakes118.exe 28 PID 2020 wrote to memory of 1716 2020 fe74f1e6fc03b67e02fb542d5a029fd0_JaffaCakes118.exe 28 PID 1716 wrote to memory of 2788 1716 msgmr.exe 29 PID 1716 wrote to memory of 2788 1716 msgmr.exe 29 PID 1716 wrote to memory of 2788 1716 msgmr.exe 29 PID 1716 wrote to memory of 2788 1716 msgmr.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe74f1e6fc03b67e02fb542d5a029fd0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe74f1e6fc03b67e02fb542d5a029fd0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\msgmr.exeC:\Windows\system32\msgmr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 443⤵
- Loads dropped DLL
- Program crash
PID:2788
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5fe74f1e6fc03b67e02fb542d5a029fd0
SHA1deed79314ac40e4ea375bdb23d3e702b6d7a675e
SHA256cffc59e524612c1d6e049e3051b9fbbee19a7d0b06fe78ea6f74fda8cb02bd39
SHA51223a073789c5aa084e1adb0e4b1cb5819d57107e5fd889b9655483c2bca2cf93f84f079242fc4494e389c430f4d6f683a09f3afd2b507fa000d1778eec121e082