Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 00:13
Behavioral task
behavioral1
Sample
9317bbbc3823a23e4f439649eb9a65a5_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
9317bbbc3823a23e4f439649eb9a65a5_JaffaCakes118.exe
-
Size
100KB
-
MD5
9317bbbc3823a23e4f439649eb9a65a5
-
SHA1
8f2aeedea7a22fac65cacc21f8c99b7f59cfdfad
-
SHA256
297f5728b2745385894404fb56f2bdb83f6565cf74aafcc101c372022af152c6
-
SHA512
eb3329ce3c2c7c20270dbce63414f185a4c521ec9ec5d42aee8aec77d426209a2c8be158ea5001ae99987692ff20e0c130c3f11ea09f732256538544ddea6112
-
SSDEEP
1536:mJv5McKmdnrc4TXNYx1vZD8qlIGrUZ5Bx5MlD7wOHUN4ZKNJf:mJeunoMXNuI+E5B/M2O0OgF
Malware Config
Signatures
-
Poullight Stealer payload 1 IoCs
resource yara_rule behavioral1/memory/1652-1-0x0000000001310000-0x0000000001330000-memory.dmp family_poullight -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1652 9317bbbc3823a23e4f439649eb9a65a5_JaffaCakes118.exe 1652 9317bbbc3823a23e4f439649eb9a65a5_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1652 9317bbbc3823a23e4f439649eb9a65a5_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5cca646afddab881d02bb60864ff72e23
SHA125b462e62a0219857cc854f6433e8acea77e3dbc
SHA256c7223e5de0b0db22b3e193b2d48215816c75472ccdf9330a0ab66d4731b2e49e
SHA512c35da6cfe5e4a3f887a876b38b4e5b9e6d5c035cf8d6f20158f89ee14a196941fd6a29faa1f90f64cd253556536670773ec15cd358014d994483a8745c41587d