Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
155315a2b764b7561959a26e3e05a43c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
155315a2b764b7561959a26e3e05a43c_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
155315a2b764b7561959a26e3e05a43c_JaffaCakes118.exe
-
Size
19.9MB
-
MD5
155315a2b764b7561959a26e3e05a43c
-
SHA1
57519a5dc7168d1f45b89d5b86859ec3d1489842
-
SHA256
06e6187e59ed24e37233bdfeb62a1df25d2e7eecb2bade1e24d2b36beca341e5
-
SHA512
d0c03ccca2a64533d81f0d94323aebdee38500605822b94347fdd1ff5f0b6808b49899e2a250d219085c0f5e8c51a1b6b0bf03f444aa6b59992c446f24f641fb
-
SSDEEP
393216:CYKC4eyPWhgS6nAb22Oy3jPRhv37F/g8jxtK7GpQ446jIRowg+L+gK:CP/edgBnAy2OsRhPpNj3aLv6jIRXg+Lg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2008 autoinst.exe -
Loads dropped DLL 3 IoCs
pid Process 2020 155315a2b764b7561959a26e3e05a43c_JaffaCakes118.exe 2020 155315a2b764b7561959a26e3e05a43c_JaffaCakes118.exe 2008 autoinst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2008 2020 155315a2b764b7561959a26e3e05a43c_JaffaCakes118.exe 28 PID 2020 wrote to memory of 2008 2020 155315a2b764b7561959a26e3e05a43c_JaffaCakes118.exe 28 PID 2020 wrote to memory of 2008 2020 155315a2b764b7561959a26e3e05a43c_JaffaCakes118.exe 28 PID 2020 wrote to memory of 2008 2020 155315a2b764b7561959a26e3e05a43c_JaffaCakes118.exe 28 PID 2020 wrote to memory of 2008 2020 155315a2b764b7561959a26e3e05a43c_JaffaCakes118.exe 28 PID 2020 wrote to memory of 2008 2020 155315a2b764b7561959a26e3e05a43c_JaffaCakes118.exe 28 PID 2020 wrote to memory of 2008 2020 155315a2b764b7561959a26e3e05a43c_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\155315a2b764b7561959a26e3e05a43c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\155315a2b764b7561959a26e3e05a43c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\autoinst.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\autoinst.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
399B
MD5cbc57301c4fee2cfef7871a67b24ce7d
SHA109eac6358583fead55a17261c1e42b8191e4ea6f
SHA25662a6395c6afd86888b7f10b25f33f7e8da1a325fc91e00191d858dca13c7eb2d
SHA512fed970184efaa5f7b00265786f2df2ed48ddb6fc8f871b1f1cf85167d4472a58ec56c9fbb5401de5d2dacb66e6161f816f3aaff20190692336c1fc10d4043453
-
Filesize
92KB
MD51e80f971a3f74839a39104f746d45061
SHA14a9110f1db98fe2f881cf38d41f2488329809864
SHA256729f62d22f9c13154d8cd0f79ba56f99e28b9a1a23b901e56415581da1c47bfe
SHA5126eea38acbb14403dc56e39fe1ab8aba2bc4cbe14ab1cabb18930839faaf46f98c46aa6108816d579ac42c96d87797f9ab05ddc012bb705a12c7df16b37e360d1
-
Filesize
72KB
MD535f94211d4038fa3e417d6570cf6678f
SHA14bd31b789f9b9eb1c8f27bb03c91d67bcce23c00
SHA256b9e54728af0fa94acd6da145eac3781f6406f2128f6834d184b8b386a364c745
SHA512a6af562519878bf3f195acdd3debee69bd7dd5d095403400d603cd726e607fe950007649ccefc31c6d707d790cbabf23f1a6a23ce92df0cdc70447c3fe2c9de7