Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 09:23
Static task
static1
Behavioral task
behavioral1
Sample
40ffa477622861421c98bdd9e50e0874_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
40ffa477622861421c98bdd9e50e0874_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
40ffa477622861421c98bdd9e50e0874_JaffaCakes118.exe
-
Size
46KB
-
MD5
40ffa477622861421c98bdd9e50e0874
-
SHA1
39b1f04c5f2c04616b81b7148571237eae65ddbf
-
SHA256
612bd6f0c9320e3d22b3d5cc363f823c7cb60305b00efb0fa6c83a34649b2470
-
SHA512
c989900505b28b05c1b05f488b0d0f47e1d8fe08c05ebba414bc9124fba0603834c46af580d8875e472be7a1180b54c5a442b2548c32981195110b1712327e1a
-
SSDEEP
768:KOxZOgIryM1P3oO2y8UN2ivcTTJlu71TFA9nn0OjDDdmo/SK2OURvXZzOmRjh2Vb:nSgy19JSVO1ONn511/tivXZzOmRF2VGo
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2032 rfxxxfx.exe 2268 hhbhtn.exe 2860 ppjpp.exe 2384 9rrrflr.exe 2572 3jvpv.exe 2656 bntnnn.exe 2556 rlflrfl.exe 2456 rrrfrrf.exe 2544 vjvdj.exe 2444 xrfrxxr.exe 2600 hhhhtb.exe 2952 rfxfxfx.exe 2328 thhthh.exe 1988 jvjjv.exe 1932 dvjpp.exe 2004 rllrrxf.exe 948 hbnnhn.exe 2360 xlfffxf.exe 2200 lxlrxfr.exe 808 tthbth.exe 1672 9dpdp.exe 1628 1nhhtt.exe 2776 llrfrxr.exe 2276 pdpdp.exe 1212 tnhbht.exe 2140 vdjjj.exe 484 rlfrxlx.exe 1464 ddvjd.exe 1804 rxllflx.exe 2164 tnnbbh.exe 2396 jjdvj.exe 2956 hbtbnt.exe 1956 5rrxxfr.exe 1540 btthhn.exe 980 7jpvd.exe 2220 htbhtt.exe 1888 9rrrflx.exe 1104 9bbbbh.exe 3008 1xfrrxl.exe 3052 pdjjv.exe 2996 hhtntt.exe 1500 frxfxlr.exe 2244 llxlxxl.exe 2392 hbnhbb.exe 1716 ddvdv.exe 2620 tnbbhn.exe 2032 llfxfxr.exe 2856 9xllrrf.exe 2920 tbbtbt.exe 2524 vvdpd.exe 2640 xxlrxrl.exe 2560 7bthbb.exe 2636 flrlxrr.exe 2696 xrxllxl.exe 768 3djpj.exe 2760 9hnntt.exe 2428 pdpjv.exe 2436 xfrlrrx.exe 2752 ntbbnt.exe 2600 djvdj.exe 3004 lrflrlx.exe 1992 thnntb.exe 804 dvjvv.exe 1204 rlflrxl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2032 1244 40ffa477622861421c98bdd9e50e0874_JaffaCakes118.exe 28 PID 1244 wrote to memory of 2032 1244 40ffa477622861421c98bdd9e50e0874_JaffaCakes118.exe 28 PID 1244 wrote to memory of 2032 1244 40ffa477622861421c98bdd9e50e0874_JaffaCakes118.exe 28 PID 1244 wrote to memory of 2032 1244 40ffa477622861421c98bdd9e50e0874_JaffaCakes118.exe 28 PID 2032 wrote to memory of 2268 2032 rfxxxfx.exe 29 PID 2032 wrote to memory of 2268 2032 rfxxxfx.exe 29 PID 2032 wrote to memory of 2268 2032 rfxxxfx.exe 29 PID 2032 wrote to memory of 2268 2032 rfxxxfx.exe 29 PID 2268 wrote to memory of 2860 2268 hhbhtn.exe 30 PID 2268 wrote to memory of 2860 2268 hhbhtn.exe 30 PID 2268 wrote to memory of 2860 2268 hhbhtn.exe 30 PID 2268 wrote to memory of 2860 2268 hhbhtn.exe 30 PID 2860 wrote to memory of 2384 2860 ppjpp.exe 31 PID 2860 wrote to memory of 2384 2860 ppjpp.exe 31 PID 2860 wrote to memory of 2384 2860 ppjpp.exe 31 PID 2860 wrote to memory of 2384 2860 ppjpp.exe 31 PID 2384 wrote to memory of 2572 2384 9rrrflr.exe 32 PID 2384 wrote to memory of 2572 2384 9rrrflr.exe 32 PID 2384 wrote to memory of 2572 2384 9rrrflr.exe 32 PID 2384 wrote to memory of 2572 2384 9rrrflr.exe 32 PID 2572 wrote to memory of 2656 2572 3jvpv.exe 33 PID 2572 wrote to memory of 2656 2572 3jvpv.exe 33 PID 2572 wrote to memory of 2656 2572 3jvpv.exe 33 PID 2572 wrote to memory of 2656 2572 3jvpv.exe 33 PID 2656 wrote to memory of 2556 2656 bntnnn.exe 34 PID 2656 wrote to memory of 2556 2656 bntnnn.exe 34 PID 2656 wrote to memory of 2556 2656 bntnnn.exe 34 PID 2656 wrote to memory of 2556 2656 bntnnn.exe 34 PID 2556 wrote to memory of 2456 2556 rlflrfl.exe 35 PID 2556 wrote to memory of 2456 2556 rlflrfl.exe 35 PID 2556 wrote to memory of 2456 2556 rlflrfl.exe 35 PID 2556 wrote to memory of 2456 2556 rlflrfl.exe 35 PID 2456 wrote to memory of 2544 2456 rrrfrrf.exe 36 PID 2456 wrote to memory of 2544 2456 rrrfrrf.exe 36 PID 2456 wrote to memory of 2544 2456 rrrfrrf.exe 36 PID 2456 wrote to memory of 2544 2456 rrrfrrf.exe 36 PID 2544 wrote to memory of 2444 2544 vjvdj.exe 37 PID 2544 wrote to memory of 2444 2544 vjvdj.exe 37 PID 2544 wrote to memory of 2444 2544 vjvdj.exe 37 PID 2544 wrote to memory of 2444 2544 vjvdj.exe 37 PID 2444 wrote to memory of 2600 2444 xrfrxxr.exe 38 PID 2444 wrote to memory of 2600 2444 xrfrxxr.exe 38 PID 2444 wrote to memory of 2600 2444 xrfrxxr.exe 38 PID 2444 wrote to memory of 2600 2444 xrfrxxr.exe 38 PID 2600 wrote to memory of 2952 2600 hhhhtb.exe 39 PID 2600 wrote to memory of 2952 2600 hhhhtb.exe 39 PID 2600 wrote to memory of 2952 2600 hhhhtb.exe 39 PID 2600 wrote to memory of 2952 2600 hhhhtb.exe 39 PID 2952 wrote to memory of 2328 2952 rfxfxfx.exe 40 PID 2952 wrote to memory of 2328 2952 rfxfxfx.exe 40 PID 2952 wrote to memory of 2328 2952 rfxfxfx.exe 40 PID 2952 wrote to memory of 2328 2952 rfxfxfx.exe 40 PID 2328 wrote to memory of 1988 2328 thhthh.exe 41 PID 2328 wrote to memory of 1988 2328 thhthh.exe 41 PID 2328 wrote to memory of 1988 2328 thhthh.exe 41 PID 2328 wrote to memory of 1988 2328 thhthh.exe 41 PID 1988 wrote to memory of 1932 1988 jvjjv.exe 42 PID 1988 wrote to memory of 1932 1988 jvjjv.exe 42 PID 1988 wrote to memory of 1932 1988 jvjjv.exe 42 PID 1988 wrote to memory of 1932 1988 jvjjv.exe 42 PID 1932 wrote to memory of 2004 1932 dvjpp.exe 43 PID 1932 wrote to memory of 2004 1932 dvjpp.exe 43 PID 1932 wrote to memory of 2004 1932 dvjpp.exe 43 PID 1932 wrote to memory of 2004 1932 dvjpp.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\40ffa477622861421c98bdd9e50e0874_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\40ffa477622861421c98bdd9e50e0874_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
\??\c:\rfxxxfx.exec:\rfxxxfx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
\??\c:\hhbhtn.exec:\hhbhtn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
\??\c:\ppjpp.exec:\ppjpp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
\??\c:\9rrrflr.exec:\9rrrflr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
\??\c:\3jvpv.exec:\3jvpv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
\??\c:\bntnnn.exec:\bntnnn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\rlflrfl.exec:\rlflrfl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
\??\c:\rrrfrrf.exec:\rrrfrrf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2456 -
\??\c:\vjvdj.exec:\vjvdj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\xrfrxxr.exec:\xrfrxxr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
\??\c:\hhhhtb.exec:\hhhhtb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
\??\c:\rfxfxfx.exec:\rfxfxfx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\thhthh.exec:\thhthh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
\??\c:\jvjjv.exec:\jvjjv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1988 -
\??\c:\dvjpp.exec:\dvjpp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1932 -
\??\c:\rllrrxf.exec:\rllrrxf.exe17⤵
- Executes dropped EXE
PID:2004 -
\??\c:\hbnnhn.exec:\hbnnhn.exe18⤵
- Executes dropped EXE
PID:948 -
\??\c:\xlfffxf.exec:\xlfffxf.exe19⤵
- Executes dropped EXE
PID:2360 -
\??\c:\lxlrxfr.exec:\lxlrxfr.exe20⤵
- Executes dropped EXE
PID:2200 -
\??\c:\tthbth.exec:\tthbth.exe21⤵
- Executes dropped EXE
PID:808 -
\??\c:\9dpdp.exec:\9dpdp.exe22⤵
- Executes dropped EXE
PID:1672 -
\??\c:\1nhhtt.exec:\1nhhtt.exe23⤵
- Executes dropped EXE
PID:1628 -
\??\c:\llrfrxr.exec:\llrfrxr.exe24⤵
- Executes dropped EXE
PID:2776 -
\??\c:\pdpdp.exec:\pdpdp.exe25⤵
- Executes dropped EXE
PID:2276 -
\??\c:\tnhbht.exec:\tnhbht.exe26⤵
- Executes dropped EXE
PID:1212 -
\??\c:\vdjjj.exec:\vdjjj.exe27⤵
- Executes dropped EXE
PID:2140 -
\??\c:\rlfrxlx.exec:\rlfrxlx.exe28⤵
- Executes dropped EXE
PID:484 -
\??\c:\ddvjd.exec:\ddvjd.exe29⤵
- Executes dropped EXE
PID:1464 -
\??\c:\rxllflx.exec:\rxllflx.exe30⤵
- Executes dropped EXE
PID:1804 -
\??\c:\tnnbbh.exec:\tnnbbh.exe31⤵
- Executes dropped EXE
PID:2164 -
\??\c:\jjdvj.exec:\jjdvj.exe32⤵
- Executes dropped EXE
PID:2396 -
\??\c:\hbtbnt.exec:\hbtbnt.exe33⤵
- Executes dropped EXE
PID:2956 -
\??\c:\5rrxxfr.exec:\5rrxxfr.exe34⤵
- Executes dropped EXE
PID:1956 -
\??\c:\btthhn.exec:\btthhn.exe35⤵
- Executes dropped EXE
PID:1540 -
\??\c:\7jpvd.exec:\7jpvd.exe36⤵
- Executes dropped EXE
PID:980 -
\??\c:\htbhtt.exec:\htbhtt.exe37⤵
- Executes dropped EXE
PID:2220 -
\??\c:\9rrrflx.exec:\9rrrflx.exe38⤵
- Executes dropped EXE
PID:1888 -
\??\c:\9bbbbh.exec:\9bbbbh.exe39⤵
- Executes dropped EXE
PID:1104 -
\??\c:\1xfrrxl.exec:\1xfrrxl.exe40⤵
- Executes dropped EXE
PID:3008 -
\??\c:\pdjjv.exec:\pdjjv.exe41⤵
- Executes dropped EXE
PID:3052 -
\??\c:\hhtntt.exec:\hhtntt.exe42⤵
- Executes dropped EXE
PID:2996 -
\??\c:\frxfxlr.exec:\frxfxlr.exe43⤵
- Executes dropped EXE
PID:1500 -
\??\c:\llxlxxl.exec:\llxlxxl.exe44⤵
- Executes dropped EXE
PID:2244 -
\??\c:\hbnhbb.exec:\hbnhbb.exe45⤵
- Executes dropped EXE
PID:2392 -
\??\c:\ddvdv.exec:\ddvdv.exe46⤵
- Executes dropped EXE
PID:1716 -
\??\c:\fxxfxxr.exec:\fxxfxxr.exe47⤵PID:2936
-
\??\c:\tnbbhn.exec:\tnbbhn.exe48⤵
- Executes dropped EXE
PID:2620 -
\??\c:\llfxfxr.exec:\llfxfxr.exe49⤵
- Executes dropped EXE
PID:2032 -
\??\c:\9xllrrf.exec:\9xllrrf.exe50⤵
- Executes dropped EXE
PID:2856 -
\??\c:\tbbtbt.exec:\tbbtbt.exe51⤵
- Executes dropped EXE
PID:2920 -
\??\c:\vvdpd.exec:\vvdpd.exe52⤵
- Executes dropped EXE
PID:2524 -
\??\c:\xxlrxrl.exec:\xxlrxrl.exe53⤵
- Executes dropped EXE
PID:2640 -
\??\c:\7bthbb.exec:\7bthbb.exe54⤵
- Executes dropped EXE
PID:2560 -
\??\c:\flrlxrr.exec:\flrlxrr.exe55⤵
- Executes dropped EXE
PID:2636 -
\??\c:\xrxllxl.exec:\xrxllxl.exe56⤵
- Executes dropped EXE
PID:2696 -
\??\c:\3djpj.exec:\3djpj.exe57⤵
- Executes dropped EXE
PID:768 -
\??\c:\9hnntt.exec:\9hnntt.exe58⤵
- Executes dropped EXE
PID:2760 -
\??\c:\pdpjv.exec:\pdpjv.exe59⤵
- Executes dropped EXE
PID:2428 -
\??\c:\xfrlrrx.exec:\xfrlrrx.exe60⤵
- Executes dropped EXE
PID:2436 -
\??\c:\ntbbnt.exec:\ntbbnt.exe61⤵
- Executes dropped EXE
PID:2752 -
\??\c:\djvdj.exec:\djvdj.exe62⤵
- Executes dropped EXE
PID:2600 -
\??\c:\lrflrlx.exec:\lrflrlx.exe63⤵
- Executes dropped EXE
PID:3004 -
\??\c:\thnntb.exec:\thnntb.exe64⤵
- Executes dropped EXE
PID:1992 -
\??\c:\dvjvv.exec:\dvjvv.exe65⤵
- Executes dropped EXE
PID:804 -
\??\c:\rlflrxl.exec:\rlflrxl.exe66⤵
- Executes dropped EXE
PID:1204 -
\??\c:\nhnbhh.exec:\nhnbhh.exe67⤵PID:1932
-
\??\c:\xfrxrrx.exec:\xfrxrrx.exe68⤵PID:1980
-
\??\c:\nbnbtt.exec:\nbnbtt.exe69⤵PID:1648
-
\??\c:\3rllffx.exec:\3rllffx.exe70⤵PID:1908
-
\??\c:\nhbnnn.exec:\nhbnnn.exe71⤵PID:1752
-
\??\c:\xlrlrrx.exec:\xlrlrrx.exe72⤵PID:2200
-
\??\c:\thnnnn.exec:\thnnnn.exe73⤵PID:2724
-
\??\c:\9pvpp.exec:\9pvpp.exe74⤵PID:1624
-
\??\c:\3rflxxl.exec:\3rflxxl.exe75⤵PID:1672
-
\??\c:\thtthh.exec:\thtthh.exe76⤵PID:2736
-
\??\c:\vpddd.exec:\vpddd.exe77⤵PID:2764
-
\??\c:\3hhbbt.exec:\3hhbbt.exe78⤵PID:2096
-
\??\c:\btnhnn.exec:\btnhnn.exe79⤵PID:1520
-
\??\c:\vvvdp.exec:\vvvdp.exe80⤵PID:2528
-
\??\c:\7xlrllf.exec:\7xlrllf.exe81⤵PID:600
-
\??\c:\tnhhnn.exec:\tnhhnn.exe82⤵PID:2140
-
\??\c:\vvppd.exec:\vvppd.exe83⤵PID:540
-
\??\c:\xfllfxl.exec:\xfllfxl.exe84⤵PID:560
-
\??\c:\btnntb.exec:\btnntb.exe85⤵PID:1984
-
\??\c:\ppjvd.exec:\ppjvd.exe86⤵PID:2272
-
\??\c:\5flfxfx.exec:\5flfxfx.exe87⤵PID:1528
-
\??\c:\nbnnnt.exec:\nbnnnt.exe88⤵PID:2816
-
\??\c:\rflflfr.exec:\rflflfr.exe89⤵PID:2332
-
\??\c:\nhbhth.exec:\nhbhth.exe90⤵PID:2252
-
\??\c:\vdddv.exec:\vdddv.exe91⤵PID:1544
-
\??\c:\fflfxfx.exec:\fflfxfx.exe92⤵PID:1636
-
\??\c:\3nnntb.exec:\3nnntb.exe93⤵PID:3000
-
\??\c:\ppdpp.exec:\ppdpp.exe94⤵PID:1656
-
\??\c:\ffflxrr.exec:\ffflxrr.exe95⤵PID:3040
-
\??\c:\bnbhbh.exec:\bnbhbh.exe96⤵PID:2992
-
\??\c:\lxfxfxx.exec:\lxfxfxx.exe97⤵PID:3024
-
\??\c:\tnhbbn.exec:\tnhbbn.exe98⤵PID:1132
-
\??\c:\tnbnht.exec:\tnbnht.exe99⤵PID:1740
-
\??\c:\djppj.exec:\djppj.exe100⤵PID:2072
-
\??\c:\xxrflrf.exec:\xxrflrf.exe101⤵PID:2300
-
\??\c:\thhthh.exec:\thhthh.exe102⤵PID:1588
-
\??\c:\jdvdd.exec:\jdvdd.exe103⤵PID:2980
-
\??\c:\xffrxrx.exec:\xffrxrx.exe104⤵PID:2708
-
\??\c:\xlfrxff.exec:\xlfrxff.exe105⤵PID:2948
-
\??\c:\pjvjv.exec:\pjvjv.exe106⤵PID:2908
-
\??\c:\nbhbnt.exec:\nbhbnt.exe107⤵PID:2856
-
\??\c:\dpdvv.exec:\dpdvv.exe108⤵PID:1972
-
\??\c:\xllrfxr.exec:\xllrfxr.exe109⤵PID:1364
-
\??\c:\nhbnnn.exec:\nhbnnn.exe110⤵PID:2820
-
\??\c:\jvjpd.exec:\jvjpd.exe111⤵PID:2592
-
\??\c:\rlxlflr.exec:\rlxlflr.exe112⤵PID:2616
-
\??\c:\5rrxxff.exec:\5rrxxff.exe113⤵PID:2476
-
\??\c:\5vvvv.exec:\5vvvv.exe114⤵PID:2692
-
\??\c:\5dppp.exec:\5dppp.exe115⤵PID:2464
-
\??\c:\frfxxxl.exec:\frfxxxl.exe116⤵PID:2448
-
\??\c:\vpddj.exec:\vpddj.exe117⤵PID:2508
-
\??\c:\frllxrf.exec:\frllxrf.exe118⤵PID:2080
-
\??\c:\1htttt.exec:\1htttt.exe119⤵PID:2600
-
\??\c:\pdvvp.exec:\pdvvp.exe120⤵PID:2328
-
\??\c:\rflrxxf.exec:\rflrxxf.exe121⤵PID:1912
-
\??\c:\btbbhn.exec:\btbbhn.exe122⤵PID:2000
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-