Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
4dc8c98cab3d714b84859a2dda2c9c11_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4dc8c98cab3d714b84859a2dda2c9c11_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
4dc8c98cab3d714b84859a2dda2c9c11_JaffaCakes118.exe
-
Size
46KB
-
MD5
4dc8c98cab3d714b84859a2dda2c9c11
-
SHA1
8221e0487e04d524385b68649350c6afeafa90ff
-
SHA256
e1034a97fcbd8b4a7d1b795f43483961d36e493d09f2a6d4de3aff7b7cf6e5f6
-
SHA512
2a6d0d482ba2ef9c195ee4135f70666bf13b34b053324e9ee12faad64a93ac045edcd8fefdbb6e409690a40186c32a6f2a1ef16ec2637780a349e0da09600524
-
SSDEEP
768:KOxZOgIryM1P3oO2y8UN2ivcTTJlu71TFA9nn0OjDDdmo/SK2OURvXZzOmRjh2V8:nSgy19JSVO1ONn511/tivXZzOmRF2VGl
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1264 028228.exe 1724 jdppj.exe 2280 42428.exe 2172 xrfflrx.exe 1276 2628884.exe 2492 lxfxxrf.exe 2636 4284006.exe 2804 68484.exe 3004 82002.exe 1244 824622.exe 2528 hbntbh.exe 2364 646248.exe 2440 9bhhtb.exe 1808 nhnnbn.exe 1184 882462.exe 2696 frlxlxl.exe 2256 dvdjp.exe 2124 pdppv.exe 2332 lfxflrf.exe 2736 ppdjd.exe 2724 pdpjp.exe 1936 4686824.exe 1652 24602.exe 2856 3hnntb.exe 808 btbthh.exe 312 62428.exe 1824 26402.exe 588 rxrrllr.exe 1488 08486.exe 2908 8628628.exe 1128 u804084.exe 500 e64406.exe 1040 m0268.exe 1536 nthnbh.exe 1356 0888002.exe 3044 5jvvd.exe 2336 244226.exe 844 hbttnb.exe 776 202222.exe 2836 vpdvj.exe 352 42484.exe 3060 lxrxflf.exe 1624 9tttbh.exe 876 4806882.exe 1728 248226.exe 1596 2066822.exe 2156 7bbthn.exe 2264 460668.exe 1428 3nbbtn.exe 1448 vjdvp.exe 2280 9fxrxxl.exe 2172 vdvdp.exe 2928 thtthb.exe 2552 2022402.exe 2816 206848.exe 2648 4424002.exe 2620 8866228.exe 2064 4802284.exe 2628 s6824.exe 2764 40442.exe 2372 i806284.exe 2428 8628486.exe 2412 3tnnnh.exe 2424 44242.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1264 2156 4dc8c98cab3d714b84859a2dda2c9c11_JaffaCakes118.exe 28 PID 2156 wrote to memory of 1264 2156 4dc8c98cab3d714b84859a2dda2c9c11_JaffaCakes118.exe 28 PID 2156 wrote to memory of 1264 2156 4dc8c98cab3d714b84859a2dda2c9c11_JaffaCakes118.exe 28 PID 2156 wrote to memory of 1264 2156 4dc8c98cab3d714b84859a2dda2c9c11_JaffaCakes118.exe 28 PID 1264 wrote to memory of 1724 1264 028228.exe 29 PID 1264 wrote to memory of 1724 1264 028228.exe 29 PID 1264 wrote to memory of 1724 1264 028228.exe 29 PID 1264 wrote to memory of 1724 1264 028228.exe 29 PID 1724 wrote to memory of 2280 1724 jdppj.exe 30 PID 1724 wrote to memory of 2280 1724 jdppj.exe 30 PID 1724 wrote to memory of 2280 1724 jdppj.exe 30 PID 1724 wrote to memory of 2280 1724 jdppj.exe 30 PID 2280 wrote to memory of 2172 2280 42428.exe 31 PID 2280 wrote to memory of 2172 2280 42428.exe 31 PID 2280 wrote to memory of 2172 2280 42428.exe 31 PID 2280 wrote to memory of 2172 2280 42428.exe 31 PID 2172 wrote to memory of 1276 2172 xrfflrx.exe 32 PID 2172 wrote to memory of 1276 2172 xrfflrx.exe 32 PID 2172 wrote to memory of 1276 2172 xrfflrx.exe 32 PID 2172 wrote to memory of 1276 2172 xrfflrx.exe 32 PID 1276 wrote to memory of 2492 1276 2628884.exe 33 PID 1276 wrote to memory of 2492 1276 2628884.exe 33 PID 1276 wrote to memory of 2492 1276 2628884.exe 33 PID 1276 wrote to memory of 2492 1276 2628884.exe 33 PID 2492 wrote to memory of 2636 2492 lxfxxrf.exe 34 PID 2492 wrote to memory of 2636 2492 lxfxxrf.exe 34 PID 2492 wrote to memory of 2636 2492 lxfxxrf.exe 34 PID 2492 wrote to memory of 2636 2492 lxfxxrf.exe 34 PID 2636 wrote to memory of 2804 2636 4284006.exe 35 PID 2636 wrote to memory of 2804 2636 4284006.exe 35 PID 2636 wrote to memory of 2804 2636 4284006.exe 35 PID 2636 wrote to memory of 2804 2636 4284006.exe 35 PID 2804 wrote to memory of 3004 2804 68484.exe 36 PID 2804 wrote to memory of 3004 2804 68484.exe 36 PID 2804 wrote to memory of 3004 2804 68484.exe 36 PID 2804 wrote to memory of 3004 2804 68484.exe 36 PID 3004 wrote to memory of 1244 3004 82002.exe 37 PID 3004 wrote to memory of 1244 3004 82002.exe 37 PID 3004 wrote to memory of 1244 3004 82002.exe 37 PID 3004 wrote to memory of 1244 3004 82002.exe 37 PID 1244 wrote to memory of 2528 1244 824622.exe 38 PID 1244 wrote to memory of 2528 1244 824622.exe 38 PID 1244 wrote to memory of 2528 1244 824622.exe 38 PID 1244 wrote to memory of 2528 1244 824622.exe 38 PID 2528 wrote to memory of 2364 2528 hbntbh.exe 39 PID 2528 wrote to memory of 2364 2528 hbntbh.exe 39 PID 2528 wrote to memory of 2364 2528 hbntbh.exe 39 PID 2528 wrote to memory of 2364 2528 hbntbh.exe 39 PID 2364 wrote to memory of 2440 2364 646248.exe 40 PID 2364 wrote to memory of 2440 2364 646248.exe 40 PID 2364 wrote to memory of 2440 2364 646248.exe 40 PID 2364 wrote to memory of 2440 2364 646248.exe 40 PID 2440 wrote to memory of 1808 2440 9bhhtb.exe 41 PID 2440 wrote to memory of 1808 2440 9bhhtb.exe 41 PID 2440 wrote to memory of 1808 2440 9bhhtb.exe 41 PID 2440 wrote to memory of 1808 2440 9bhhtb.exe 41 PID 1808 wrote to memory of 1184 1808 nhnnbn.exe 42 PID 1808 wrote to memory of 1184 1808 nhnnbn.exe 42 PID 1808 wrote to memory of 1184 1808 nhnnbn.exe 42 PID 1808 wrote to memory of 1184 1808 nhnnbn.exe 42 PID 1184 wrote to memory of 2696 1184 882462.exe 43 PID 1184 wrote to memory of 2696 1184 882462.exe 43 PID 1184 wrote to memory of 2696 1184 882462.exe 43 PID 1184 wrote to memory of 2696 1184 882462.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dc8c98cab3d714b84859a2dda2c9c11_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4dc8c98cab3d714b84859a2dda2c9c11_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
\??\c:\028228.exec:\028228.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1264 -
\??\c:\jdppj.exec:\jdppj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1724 -
\??\c:\42428.exec:\42428.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
\??\c:\xrfflrx.exec:\xrfflrx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2172 -
\??\c:\2628884.exec:\2628884.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1276 -
\??\c:\lxfxxrf.exec:\lxfxxrf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
\??\c:\4284006.exec:\4284006.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
\??\c:\68484.exec:\68484.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
\??\c:\82002.exec:\82002.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
\??\c:\824622.exec:\824622.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1244 -
\??\c:\hbntbh.exec:\hbntbh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
\??\c:\646248.exec:\646248.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
\??\c:\9bhhtb.exec:\9bhhtb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
\??\c:\nhnnbn.exec:\nhnnbn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1808 -
\??\c:\882462.exec:\882462.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1184 -
\??\c:\frlxlxl.exec:\frlxlxl.exe17⤵
- Executes dropped EXE
PID:2696 -
\??\c:\dvdjp.exec:\dvdjp.exe18⤵
- Executes dropped EXE
PID:2256 -
\??\c:\pdppv.exec:\pdppv.exe19⤵
- Executes dropped EXE
PID:2124 -
\??\c:\lfxflrf.exec:\lfxflrf.exe20⤵
- Executes dropped EXE
PID:2332 -
\??\c:\ppdjd.exec:\ppdjd.exe21⤵
- Executes dropped EXE
PID:2736 -
\??\c:\pdpjp.exec:\pdpjp.exe22⤵
- Executes dropped EXE
PID:2724 -
\??\c:\4686824.exec:\4686824.exe23⤵
- Executes dropped EXE
PID:1936 -
\??\c:\24602.exec:\24602.exe24⤵
- Executes dropped EXE
PID:1652 -
\??\c:\3hnntb.exec:\3hnntb.exe25⤵
- Executes dropped EXE
PID:2856 -
\??\c:\btbthh.exec:\btbthh.exe26⤵
- Executes dropped EXE
PID:808 -
\??\c:\62428.exec:\62428.exe27⤵
- Executes dropped EXE
PID:312 -
\??\c:\26402.exec:\26402.exe28⤵
- Executes dropped EXE
PID:1824 -
\??\c:\rxrrllr.exec:\rxrrllr.exe29⤵
- Executes dropped EXE
PID:588 -
\??\c:\08486.exec:\08486.exe30⤵
- Executes dropped EXE
PID:1488 -
\??\c:\8628628.exec:\8628628.exe31⤵
- Executes dropped EXE
PID:2908 -
\??\c:\u804084.exec:\u804084.exe32⤵
- Executes dropped EXE
PID:1128 -
\??\c:\e64406.exec:\e64406.exe33⤵
- Executes dropped EXE
PID:500 -
\??\c:\m0268.exec:\m0268.exe34⤵
- Executes dropped EXE
PID:1040 -
\??\c:\nthnbh.exec:\nthnbh.exe35⤵
- Executes dropped EXE
PID:1536 -
\??\c:\0888002.exec:\0888002.exe36⤵
- Executes dropped EXE
PID:1356 -
\??\c:\5jvvd.exec:\5jvvd.exe37⤵
- Executes dropped EXE
PID:3044 -
\??\c:\244226.exec:\244226.exe38⤵
- Executes dropped EXE
PID:2336 -
\??\c:\hbttnb.exec:\hbttnb.exe39⤵
- Executes dropped EXE
PID:844 -
\??\c:\202222.exec:\202222.exe40⤵
- Executes dropped EXE
PID:776 -
\??\c:\vpdvj.exec:\vpdvj.exe41⤵
- Executes dropped EXE
PID:2836 -
\??\c:\42484.exec:\42484.exe42⤵
- Executes dropped EXE
PID:352 -
\??\c:\lxrxflf.exec:\lxrxflf.exe43⤵
- Executes dropped EXE
PID:3060 -
\??\c:\9tttbh.exec:\9tttbh.exe44⤵
- Executes dropped EXE
PID:1624 -
\??\c:\4806882.exec:\4806882.exe45⤵
- Executes dropped EXE
PID:876 -
\??\c:\248226.exec:\248226.exe46⤵
- Executes dropped EXE
PID:1728 -
\??\c:\2066822.exec:\2066822.exe47⤵
- Executes dropped EXE
PID:1596 -
\??\c:\7bbthn.exec:\7bbthn.exe48⤵
- Executes dropped EXE
PID:2156 -
\??\c:\460668.exec:\460668.exe49⤵
- Executes dropped EXE
PID:2264 -
\??\c:\3nbbtn.exec:\3nbbtn.exe50⤵
- Executes dropped EXE
PID:1428 -
\??\c:\vjdvp.exec:\vjdvp.exe51⤵
- Executes dropped EXE
PID:1448 -
\??\c:\9fxrxxl.exec:\9fxrxxl.exe52⤵
- Executes dropped EXE
PID:2280 -
\??\c:\vdvdp.exec:\vdvdp.exe53⤵
- Executes dropped EXE
PID:2172 -
\??\c:\thtthb.exec:\thtthb.exe54⤵
- Executes dropped EXE
PID:2928 -
\??\c:\2022402.exec:\2022402.exe55⤵
- Executes dropped EXE
PID:2552 -
\??\c:\206848.exec:\206848.exe56⤵
- Executes dropped EXE
PID:2816 -
\??\c:\4424002.exec:\4424002.exe57⤵
- Executes dropped EXE
PID:2648 -
\??\c:\8866228.exec:\8866228.exe58⤵
- Executes dropped EXE
PID:2620 -
\??\c:\4802284.exec:\4802284.exe59⤵
- Executes dropped EXE
PID:2064 -
\??\c:\s6824.exec:\s6824.exe60⤵
- Executes dropped EXE
PID:2628 -
\??\c:\40442.exec:\40442.exe61⤵
- Executes dropped EXE
PID:2764 -
\??\c:\i806284.exec:\i806284.exe62⤵
- Executes dropped EXE
PID:2372 -
\??\c:\8628486.exec:\8628486.exe63⤵
- Executes dropped EXE
PID:2428 -
\??\c:\3tnnnh.exec:\3tnnnh.exe64⤵
- Executes dropped EXE
PID:2412 -
\??\c:\44242.exec:\44242.exe65⤵
- Executes dropped EXE
PID:2424 -
\??\c:\thtthh.exec:\thtthh.exe66⤵PID:2420
-
\??\c:\pdpvv.exec:\pdpvv.exe67⤵PID:1996
-
\??\c:\9fllflf.exec:\9fllflf.exe68⤵PID:240
-
\??\c:\nhhnht.exec:\nhhnht.exe69⤵PID:2604
-
\??\c:\btnnnh.exec:\btnnnh.exe70⤵PID:1444
-
\??\c:\82824.exec:\82824.exe71⤵PID:1868
-
\??\c:\0860624.exec:\0860624.exe72⤵PID:2728
-
\??\c:\420082.exec:\420082.exe73⤵PID:2712
-
\??\c:\q62844.exec:\q62844.exe74⤵PID:1628
-
\??\c:\jvvpv.exec:\jvvpv.exe75⤵PID:1636
-
\??\c:\w82848.exec:\w82848.exe76⤵PID:1936
-
\??\c:\1tntbb.exec:\1tntbb.exe77⤵PID:2776
-
\??\c:\vjdvd.exec:\vjdvd.exe78⤵PID:2400
-
\??\c:\042288.exec:\042288.exe79⤵PID:2252
-
\??\c:\2622006.exec:\2622006.exe80⤵PID:808
-
\??\c:\6028006.exec:\6028006.exe81⤵PID:1832
-
\??\c:\262846.exec:\262846.exe82⤵PID:1340
-
\??\c:\9vddj.exec:\9vddj.exe83⤵PID:1816
-
\??\c:\jjjpv.exec:\jjjpv.exe84⤵PID:576
-
\??\c:\xlrrxfx.exec:\xlrrxfx.exe85⤵PID:1032
-
\??\c:\xfrlxxx.exec:\xfrlxxx.exe86⤵PID:1876
-
\??\c:\1frrxrx.exec:\1frrxrx.exe87⤵PID:1532
-
\??\c:\xxlrrrr.exec:\xxlrrrr.exe88⤵PID:1752
-
\??\c:\2028006.exec:\2028006.exe89⤵PID:1696
-
\??\c:\6044046.exec:\6044046.exe90⤵PID:1852
-
\??\c:\6084662.exec:\6084662.exe91⤵PID:1040
-
\??\c:\hbntnh.exec:\hbntnh.exe92⤵PID:1612
-
\??\c:\9tttbb.exec:\9tttbb.exe93⤵PID:1356
-
\??\c:\42840.exec:\42840.exe94⤵PID:3044
-
\??\c:\vdjjj.exec:\vdjjj.exe95⤵PID:1760
-
\??\c:\08068.exec:\08068.exe96⤵PID:844
-
\??\c:\5jddd.exec:\5jddd.exe97⤵PID:776
-
\??\c:\46060.exec:\46060.exe98⤵PID:2088
-
\??\c:\o200228.exec:\o200228.exe99⤵PID:352
-
\??\c:\5vdjp.exec:\5vdjp.exe100⤵PID:3060
-
\??\c:\2424228.exec:\2424228.exe101⤵PID:1624
-
\??\c:\nbnhnn.exec:\nbnhnn.exe102⤵PID:1500
-
\??\c:\u022006.exec:\u022006.exe103⤵PID:1732
-
\??\c:\20824.exec:\20824.exe104⤵PID:1840
-
\??\c:\ntthtn.exec:\ntthtn.exe105⤵PID:2156
-
\??\c:\rxlxflx.exec:\rxlxflx.exe106⤵PID:1884
-
\??\c:\5thntt.exec:\5thntt.exe107⤵PID:1428
-
\??\c:\rlflllf.exec:\rlflllf.exe108⤵PID:1448
-
\??\c:\s2062.exec:\s2062.exe109⤵PID:2280
-
\??\c:\w82840.exec:\w82840.exe110⤵PID:2172
-
\??\c:\220400.exec:\220400.exe111⤵PID:2928
-
\??\c:\02884.exec:\02884.exe112⤵PID:2516
-
\??\c:\46664.exec:\46664.exe113⤵PID:2816
-
\??\c:\thttnn.exec:\thttnn.exe114⤵PID:2800
-
\??\c:\9dppp.exec:\9dppp.exe115⤵PID:2620
-
\??\c:\xrlllrx.exec:\xrlllrx.exe116⤵PID:2064
-
\??\c:\8240284.exec:\8240284.exe117⤵PID:2628
-
\??\c:\tttnnn.exec:\tttnnn.exe118⤵PID:2528
-
\??\c:\g6884.exec:\g6884.exe119⤵PID:2484
-
\??\c:\42824.exec:\42824.exe120⤵PID:2884
-
\??\c:\88006.exec:\88006.exe121⤵PID:2412
-
\??\c:\i426224.exec:\i426224.exe122⤵PID:1312
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-