Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
19/06/2024, 23:14
Behavioral task
behavioral1
Sample
01174d0a0f518ce0f352b99558951340_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
01174d0a0f518ce0f352b99558951340_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
01174d0a0f518ce0f352b99558951340_JaffaCakes118.exe
-
Size
57KB
-
MD5
01174d0a0f518ce0f352b99558951340
-
SHA1
5660e5b507ffa51cbbe35cfab1c88be8cfbfa7d3
-
SHA256
5d52819ce007ba93c672f47d125fcbe8d799f0bd7af7f1e6dd7d36fcd4c7a095
-
SHA512
841a90ce2a25f4d21b7cfb13657a2c32350309cb4ea886f985b472268c275d5bce6e04b3a726a625e67856c7f84b20bf38c5ec4f1862cce30b09a90016687a43
-
SSDEEP
768:o5W42ET4cJa9fn7WEIUWBFoglD8u/nRvRGzKos8qaENKR8GL4/HYNijkgE4L2/x2:o5MET4FURU4nlD7/nddRGMfYY5ELlwZR
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1300-0-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2012 1300 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1300 wrote to memory of 2012 1300 01174d0a0f518ce0f352b99558951340_JaffaCakes118.exe 28 PID 1300 wrote to memory of 2012 1300 01174d0a0f518ce0f352b99558951340_JaffaCakes118.exe 28 PID 1300 wrote to memory of 2012 1300 01174d0a0f518ce0f352b99558951340_JaffaCakes118.exe 28 PID 1300 wrote to memory of 2012 1300 01174d0a0f518ce0f352b99558951340_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\01174d0a0f518ce0f352b99558951340_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\01174d0a0f518ce0f352b99558951340_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1300 -s 362⤵
- Program crash
PID:2012
-