Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
0a3aeecbc6402cf0ec4cfc1c5ed4efc5_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0a3aeecbc6402cf0ec4cfc1c5ed4efc5_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0a3aeecbc6402cf0ec4cfc1c5ed4efc5_JaffaCakes118.exe
-
Size
20KB
-
MD5
0a3aeecbc6402cf0ec4cfc1c5ed4efc5
-
SHA1
2bdc398f97ea91f09aadded15e25fa7d96eb37ca
-
SHA256
3d103ee0296b2de6638a2954ba7ec9b3c8b3a5f07ca8e4106e32079fc218bab9
-
SHA512
a6997e3342fc0d4666d4276fcee78ea298ad176fde3f59f91ab954f0c48ccd036dff76f0d22525a16ef8c0f584340a8135bbb924456e36231b1064bc86574995
-
SSDEEP
384:Lbg7pwv+7qaiDbC6ifGL/qQmQj0vkbteTgt9SqUg92Gc386:/gymE74GL/qQmGIkITgH4gUGc3r
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2444 cmd.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\kr_done1 0a3aeecbc6402cf0ec4cfc1c5ed4efc5_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2392 0a3aeecbc6402cf0ec4cfc1c5ed4efc5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2444 2392 0a3aeecbc6402cf0ec4cfc1c5ed4efc5_JaffaCakes118.exe 29 PID 2392 wrote to memory of 2444 2392 0a3aeecbc6402cf0ec4cfc1c5ed4efc5_JaffaCakes118.exe 29 PID 2392 wrote to memory of 2444 2392 0a3aeecbc6402cf0ec4cfc1c5ed4efc5_JaffaCakes118.exe 29 PID 2392 wrote to memory of 2444 2392 0a3aeecbc6402cf0ec4cfc1c5ed4efc5_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a3aeecbc6402cf0ec4cfc1c5ed4efc5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0a3aeecbc6402cf0ec4cfc1c5ed4efc5_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\\uninstf7691d4.bat" "C:\Users\Admin\AppData\Local\Temp\0a3aeecbc6402cf0ec4cfc1c5ed4efc5_JaffaCakes118.exe""2⤵
- Deletes itself
PID:2444
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59B
MD52988b921fbed03f9c93c5d538932bbe3
SHA14b791b3d59ae76ff091c2cf201b40f5d1b432a3f
SHA256a1769979622d3d25829be12474ad32ccfdfcac59785dac2fc10ae49c300e4ea3
SHA5122920c6e9851973371dc238da1ee3c63d41c7820637856ee92c67e9489c1790e3fad287d229440d124e60b978f6819d04b47c40de9034cbd9de422aaafc2b07f9