Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
32520f6005d...18.exe
windows7-x64
72520f6005d...18.exe
windows10-2004-x64
7$DESKTOP/P...ne.jad
windows7-x64
3$DESKTOP/P...ne.jad
windows10-2004-x64
3$DESKTOP/P...ne.jad
windows7-x64
3$DESKTOP/P...ne.jad
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3PassMem.chm
windows7-x64
1PassMem.chm
windows10-2004-x64
1PassMem.exe
windows7-x64
1PassMem.exe
windows10-2004-x64
1UpdateApp.exe
windows7-x64
1UpdateApp.exe
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 13:47
Static task
static1
Behavioral task
behavioral1
Sample
2520f6005dd43203190a230828793f17_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2520f6005dd43203190a230828793f17_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$DESKTOP/PassMemPhone.jad
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$DESKTOP/PassMemPhone.jad
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$DESKTOP/PassMemPhone.jad
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
$DESKTOP/PassMemPhone.jad
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240419-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
PassMem.chm
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
PassMem.chm
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
PassMem.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
PassMem.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
UpdateApp.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
UpdateApp.exe
Resource
win10v2004-20240508-en
General
-
Target
2520f6005dd43203190a230828793f17_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
2520f6005dd43203190a230828793f17
-
SHA1
8df5c6d216e65e8c1bedf5e48979577a2569b909
-
SHA256
21557ee16033865aae503b34894ffac3d921f6f17a4b1f11ca926092b315fde4
-
SHA512
cd7bf81664c63a95c20122cd6214d38ee8e209380ab1ef23d4cd9b5cfc9cf83eac12310a336351479cc6ac8c0260d223121b614f980fee33979dba4e36952c52
-
SSDEEP
24576:1/H+4Y7fiW786nfOaku/Sroy91+pNX8C5S+qud3s6u:VMaWQ6nfOafSL91+H8qLqdR
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 2328 2520f6005dd43203190a230828793f17_JaffaCakes118.exe 2328 2520f6005dd43203190a230828793f17_JaffaCakes118.exe 2328 2520f6005dd43203190a230828793f17_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2328 2520f6005dd43203190a230828793f17_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD528cc7e9462fe8a657cec02d36f055d1c
SHA1781266aaf64ec9d6a1cf305aa77ffa61131d745f
SHA256e3809fccd0aaed12424a4b17dbf275b44f420e2d9bce63af925fc919afd6c4a4
SHA512fc0e00b745773e2039417d684dfa9bded348e2eccfcaa515ebe3b13fd46c79a0d0cda1d7ae00b49bc10675f9f5cd94a987e7fd8822ecd8df886d243117e9c743
-
Filesize
15KB
MD589351a0a6a89519c86c5531e20dab9ea
SHA19e801aaaae9e70d8f7fc52f6f12cedc55e4c8a00
SHA256f530069ef87a1c163c4fd63a3d5b053420ce3d7a98739c70211b4a99f90d6277
SHA51213168fa828b581383e5f64d3b54be357e98d2eb9362b45685e7426ffc2f0696ab432cc8a3f374ce8abd03c096f1662d954877afa886fc4aa74709e6044b75c08
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
24KB
MD51fc1fbb2c7a14b7901fc9abbd6dbef10
SHA14d9ed86f31075a3d3f674ff78f39c190a4098126
SHA2564f26394c93f1acb315c42c351983dafc7f094b2d05db6d7a1ba7dcb39a3a599e
SHA51276d8ff7fc301cc5ff966ad8be17f0f3f2d869ef797c5a2c55a062305c02133a842906448741bf9818ec369bbb2932b9a9c2193ebc59835b50e8703db0090fdb2