Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
0872dcc4bec1b2a17b17fab518fdaab5_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0872dcc4bec1b2a17b17fab518fdaab5_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0872dcc4bec1b2a17b17fab518fdaab5_JaffaCakes118.exe
-
Size
175KB
-
MD5
0872dcc4bec1b2a17b17fab518fdaab5
-
SHA1
58d439d26ac398a20e275a3e2587bc47dca791dc
-
SHA256
d58c2c3fecffaa65c1cfb95534bc4e2bd17512a20cf2b69e718a91456330bf00
-
SHA512
8205d970b6d90903ecbfd51530352c7cd718ce99139fadde73ad5fd93fae294ce1f46b60edb203fa6e74b83d96d4d4e7860bbc7762e852f02e8af70dbf1be8cd
-
SSDEEP
3072:ajeJvTHjs3ypJ7ib5tf5wExuijs1n4oCku7CgveTXs1E7/cjo:keJvTY3EiVEaXjs1n4oCkumgGAjo
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" 0872dcc4bec1b2a17b17fab518fdaab5_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/816-1-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2792-6-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2792-5-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/1908-80-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/816-82-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/816-198-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/816-199-0x0000000000400000-0x000000000048A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 816 wrote to memory of 2792 816 0872dcc4bec1b2a17b17fab518fdaab5_JaffaCakes118.exe 28 PID 816 wrote to memory of 2792 816 0872dcc4bec1b2a17b17fab518fdaab5_JaffaCakes118.exe 28 PID 816 wrote to memory of 2792 816 0872dcc4bec1b2a17b17fab518fdaab5_JaffaCakes118.exe 28 PID 816 wrote to memory of 2792 816 0872dcc4bec1b2a17b17fab518fdaab5_JaffaCakes118.exe 28 PID 816 wrote to memory of 1908 816 0872dcc4bec1b2a17b17fab518fdaab5_JaffaCakes118.exe 30 PID 816 wrote to memory of 1908 816 0872dcc4bec1b2a17b17fab518fdaab5_JaffaCakes118.exe 30 PID 816 wrote to memory of 1908 816 0872dcc4bec1b2a17b17fab518fdaab5_JaffaCakes118.exe 30 PID 816 wrote to memory of 1908 816 0872dcc4bec1b2a17b17fab518fdaab5_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0872dcc4bec1b2a17b17fab518fdaab5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0872dcc4bec1b2a17b17fab518fdaab5_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\0872dcc4bec1b2a17b17fab518fdaab5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0872dcc4bec1b2a17b17fab518fdaab5_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\0872dcc4bec1b2a17b17fab518fdaab5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0872dcc4bec1b2a17b17fab518fdaab5_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:1908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD51f2caeec97168694f29729e809885600
SHA1325abc97e2b78bbf56f60494fb1bf8026d16789e
SHA25600c7b70b279b34ab557d0a3c1a1ff9d41047352980df3f5a4176663a933ebbf2
SHA512304d2ce6af512e053e307d532077ed196b0bbb94db95ca5d697774a7e056ef7c8e1a0e0541e4df60bca071f6d80387f7d6803961c74a8f0881eff143a985d009
-
Filesize
996B
MD504fdbbfea51a464fdb84f2ea4a2b24ad
SHA1b24940d1a9f794e28c4a2c020e5d1dec727db793
SHA25630051fed061027c6dbbfeb19b78f3662f09ea988767524ddadd28753027588df
SHA512db1edeaebddfda847db094317f8bfc11657f57736d20799fa1935f682b98d5f32a3b30e4953d064de4f64922b2e2198ede931bdb27e763781df8fa93ebca00a6