Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 14:36
Static task
static1
Behavioral task
behavioral1
Sample
3512d08a932b4b8d6ccdc259def8e064_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3512d08a932b4b8d6ccdc259def8e064_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
3512d08a932b4b8d6ccdc259def8e064_JaffaCakes118.exe
-
Size
690KB
-
MD5
3512d08a932b4b8d6ccdc259def8e064
-
SHA1
420113523781f62428aeb556c35e75da69292177
-
SHA256
1f8ab348af6cbbe737f5831fd3ff5c1313615ef3c15313e42ca6688ece4a7627
-
SHA512
c9bdc77688746f62b88a98d88603cdfb7ee63d618368493a39f839c766ee1d2d8c1fc0ab313440491ef30369705c8c10e864c274fba708477c79fcc7910cfece
-
SSDEEP
12288:Zb7wrmUJeglq/0PwSF0/46I4jlkt4hTF0yhHMLju7Jrn6dYCY3kS5+ZRUk+/KKbw:Zb7wrPJ7lqcY9PJktcp0sz7d+YCYzcEM
Malware Config
Signatures
-
pid Process 2096 Powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2096 Powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2096 Powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2096 2856 3512d08a932b4b8d6ccdc259def8e064_JaffaCakes118.exe 28 PID 2856 wrote to memory of 2096 2856 3512d08a932b4b8d6ccdc259def8e064_JaffaCakes118.exe 28 PID 2856 wrote to memory of 2096 2856 3512d08a932b4b8d6ccdc259def8e064_JaffaCakes118.exe 28 PID 2856 wrote to memory of 2096 2856 3512d08a932b4b8d6ccdc259def8e064_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3512d08a932b4b8d6ccdc259def8e064_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3512d08a932b4b8d6ccdc259def8e064_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -ExecutionPolicy UnRestricted -NoLogo [System.Reflection.Assembly]::Load([Convert]::FromBase64String([IO.File]::ReadAllText('C:\Users\Admin\NTUSER'))).EntryPoint.Invoke($null,$null);2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD57a837a84ff4c1ca8d8604c8fbd104273
SHA1b83d6518e48730bed88066e611a06f01561f8c25
SHA2568253c0a13f03dc521e7e51f2f3a2c1930456f5d544bd56d4138fd677b4eb05db
SHA5123c93820f4db1351df5807510c35c13d2e276b6cf7969936ea4bc30a17e9cf68da22f4d10c5d80a0d60bce6c906c4ac9f75819b3dc2505d6e8f51fc436efd234d