Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 12:32
Static task
static1
Behavioral task
behavioral1
Sample
6af40914a9f5be1504d60d3d093c3256_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6af40914a9f5be1504d60d3d093c3256_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
6af40914a9f5be1504d60d3d093c3256_JaffaCakes118.exe
-
Size
466KB
-
MD5
6af40914a9f5be1504d60d3d093c3256
-
SHA1
1a016380859599e52450f16bb374f11973a96290
-
SHA256
06203bd99393b55036964207c9e8733427796e9f77d410be70e743bba670d5ef
-
SHA512
5e7bad11750783d421b36be8ff88755abadcb8fa67c22785385c0a8b234716b14e50bdd21228d3b60586563b59403ba10531731122d06a479a6fcd2cca2b69b0
-
SSDEEP
6144:1uUNi3ppFiuCsLOEEwyGY/ng2RGTP5CiuWeSoV2p+pfTAd8RZR2fnm:1x4zXKEbYvg2GCiaS+2IREd8ROm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2764 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2792 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2764 1728 6af40914a9f5be1504d60d3d093c3256_JaffaCakes118.exe 30 PID 1728 wrote to memory of 2764 1728 6af40914a9f5be1504d60d3d093c3256_JaffaCakes118.exe 30 PID 1728 wrote to memory of 2764 1728 6af40914a9f5be1504d60d3d093c3256_JaffaCakes118.exe 30 PID 1728 wrote to memory of 2764 1728 6af40914a9f5be1504d60d3d093c3256_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2792 2764 cmd.exe 32 PID 2764 wrote to memory of 2792 2764 cmd.exe 32 PID 2764 wrote to memory of 2792 2764 cmd.exe 32 PID 2764 wrote to memory of 2792 2764 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\6af40914a9f5be1504d60d3d093c3256_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6af40914a9f5be1504d60d3d093c3256_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\6af40914a9f5be1504d60d3d093c3256_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2792
-
-