Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
a5c5673e78d26c2aa7b83fc42edc25cc_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
a5c5673e78d26c2aa7b83fc42edc25cc_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
a5c5673e78d26c2aa7b83fc42edc25cc_JaffaCakes118.exe
-
Size
22.8MB
-
MD5
a5c5673e78d26c2aa7b83fc42edc25cc
-
SHA1
d37a852f644eb60e83701c803e745abb6d533877
-
SHA256
00d6692268b846e9ecaa9ab16ad0162624a7ec2a85965ac94bd8152d56857325
-
SHA512
14db15302299c61e8ac57ad46d403d44a288d2ad1872a9ec616fca04a0581a526fe41205c8e678fdbb130877ee19e741d75c6cb152b8b2de74516e61205c3fcc
-
SSDEEP
393216:eo1Csocy9SaLw4joCqyiLazJQ+uZ/yyAgER1O2/ntzfa5EZnaRKzFdSN0OOzOVRA:bqh+4joCDiLw2/yytwO2lQEhU0O4OVRA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2016 a5c5673e78d26c2aa7b83fc42edc25cc_JaffaCakes118.tmp -
Loads dropped DLL 2 IoCs
pid Process 3000 a5c5673e78d26c2aa7b83fc42edc25cc_JaffaCakes118.exe 2016 a5c5673e78d26c2aa7b83fc42edc25cc_JaffaCakes118.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2016 3000 a5c5673e78d26c2aa7b83fc42edc25cc_JaffaCakes118.exe 28 PID 3000 wrote to memory of 2016 3000 a5c5673e78d26c2aa7b83fc42edc25cc_JaffaCakes118.exe 28 PID 3000 wrote to memory of 2016 3000 a5c5673e78d26c2aa7b83fc42edc25cc_JaffaCakes118.exe 28 PID 3000 wrote to memory of 2016 3000 a5c5673e78d26c2aa7b83fc42edc25cc_JaffaCakes118.exe 28 PID 3000 wrote to memory of 2016 3000 a5c5673e78d26c2aa7b83fc42edc25cc_JaffaCakes118.exe 28 PID 3000 wrote to memory of 2016 3000 a5c5673e78d26c2aa7b83fc42edc25cc_JaffaCakes118.exe 28 PID 3000 wrote to memory of 2016 3000 a5c5673e78d26c2aa7b83fc42edc25cc_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5c5673e78d26c2aa7b83fc42edc25cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5c5673e78d26c2aa7b83fc42edc25cc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\is-45NIK.tmp\a5c5673e78d26c2aa7b83fc42edc25cc_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-45NIK.tmp\a5c5673e78d26c2aa7b83fc42edc25cc_JaffaCakes118.tmp" /SL5="$400E0,23321443,119808,C:\Users\Admin\AppData\Local\Temp\a5c5673e78d26c2aa7b83fc42edc25cc_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2016
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d5d303dbabe599c5b4c9b96571d1b599
SHA1265641e6144297bfe761ca3b332349e0d0b7a5b5
SHA256e277bc4cc95eec3a3b1341270f62c12adcf2c6ed666f59f611219e4193d1fe44
SHA512de44eac295721c07c789a1c5862e1522a0c0a73d0a0e6d016de60672fab447e7eae5b7b5ad9ae2be2cadf1d9559cdadc6bd2367a195172305085ab1bc2c683be
-
Filesize
200KB
MD5d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df