Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
02377a2e9c80a39c470cf66c7bbd8f93_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
02377a2e9c80a39c470cf66c7bbd8f93_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
02377a2e9c80a39c470cf66c7bbd8f93_JaffaCakes118.exe
-
Size
715KB
-
MD5
02377a2e9c80a39c470cf66c7bbd8f93
-
SHA1
94e65a76eebe3d70a4f4b76779d811ee0c1f797e
-
SHA256
7fa1e3e27a20a7c26979f4c76be7461846434d0031a10c913995fcdcd2dde761
-
SHA512
f24e90a23faeacea232cbd352614809d2112e63f96533a02e5b784f312e07d5f802944aa8768a6acc7ba8c96c7dd30d5c5db64738b46bafe958e88d6d208047a
-
SSDEEP
12288:QRkTSklU4g/n/t0EW5A0zypvJwQ5oAlK+G9svnbIk6kQQ52L8Rg08b5sZ6tPn:UUlU4gf2EW5A20Jr/kHsvbIk6OeD5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 544 Hacker.com.cn.exe -
Loads dropped DLL 4 IoCs
pid Process 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 544 set thread context of 3056 544 Hacker.com.cn.exe 29 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.exe 02377a2e9c80a39c470cf66c7bbd8f93_JaffaCakes118.exe File opened for modification C:\Windows\Hacker.com.cn.exe 02377a2e9c80a39c470cf66c7bbd8f93_JaffaCakes118.exe File created C:\Windows\uninstel.bat 02377a2e9c80a39c470cf66c7bbd8f93_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2288 2980 WerFault.exe 27 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2980 02377a2e9c80a39c470cf66c7bbd8f93_JaffaCakes118.exe Token: SeDebugPrivilege 544 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 544 wrote to memory of 3056 544 Hacker.com.cn.exe 29 PID 544 wrote to memory of 3056 544 Hacker.com.cn.exe 29 PID 544 wrote to memory of 3056 544 Hacker.com.cn.exe 29 PID 544 wrote to memory of 3056 544 Hacker.com.cn.exe 29 PID 544 wrote to memory of 3056 544 Hacker.com.cn.exe 29 PID 544 wrote to memory of 3056 544 Hacker.com.cn.exe 29 PID 2980 wrote to memory of 2288 2980 02377a2e9c80a39c470cf66c7bbd8f93_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2288 2980 02377a2e9c80a39c470cf66c7bbd8f93_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2288 2980 02377a2e9c80a39c470cf66c7bbd8f93_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2288 2980 02377a2e9c80a39c470cf66c7bbd8f93_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\02377a2e9c80a39c470cf66c7bbd8f93_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\02377a2e9c80a39c470cf66c7bbd8f93_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 3522⤵
- Loads dropped DLL
- Program crash
PID:2288
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544 -
C:\WINDOWS\SysWOW64\svchost.exeC:\WINDOWS\system32\svchost.exe................2⤵PID:3056
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
715KB
MD502377a2e9c80a39c470cf66c7bbd8f93
SHA194e65a76eebe3d70a4f4b76779d811ee0c1f797e
SHA2567fa1e3e27a20a7c26979f4c76be7461846434d0031a10c913995fcdcd2dde761
SHA512f24e90a23faeacea232cbd352614809d2112e63f96533a02e5b784f312e07d5f802944aa8768a6acc7ba8c96c7dd30d5c5db64738b46bafe958e88d6d208047a