Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe
-
Size
76KB
-
MD5
0dfa7c02f4bc82b81e87744634dd3285
-
SHA1
0b51ddcca2470fd50fbcaecd9ab5646d9e0c9f87
-
SHA256
87cba23aae5844925a851dc0d71007936c4ba140d0bc932800223fe093456f2f
-
SHA512
154ced45634e69136870b65c0cf7e1cc53fc154939bf1efec6366e3a56ba9b83ee6a3f49fbc9179cd6ca981d51ed9cb40c17b4590a1e57447322163fc1f0b1ff
-
SSDEEP
1536:1rUlDSCvWmum6ezmm/ASwwb50UUgaolhCgV8ckz6Jc6gwd+Wl:p8DTumuhez9/Xwwb50UUgaonCgV8c3J7
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon = "C:\\Windows\\TEMP\\services.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\msmmsgr = "C:\\Windows\\TEMP\\x\\services.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2932 set thread context of 1936 2932 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 31 -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2648 reg.exe 2652 reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1936 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 1936 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2380 2932 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 28 PID 2932 wrote to memory of 2380 2932 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 28 PID 2932 wrote to memory of 2380 2932 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 28 PID 2932 wrote to memory of 2380 2932 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 28 PID 2932 wrote to memory of 2628 2932 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 29 PID 2932 wrote to memory of 2628 2932 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 29 PID 2932 wrote to memory of 2628 2932 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 29 PID 2932 wrote to memory of 2628 2932 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 29 PID 2932 wrote to memory of 1936 2932 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 31 PID 2932 wrote to memory of 1936 2932 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 31 PID 2932 wrote to memory of 1936 2932 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 31 PID 2932 wrote to memory of 1936 2932 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 31 PID 2932 wrote to memory of 1936 2932 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 31 PID 2932 wrote to memory of 1936 2932 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 31 PID 2932 wrote to memory of 1936 2932 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2648 2380 cmd.exe 33 PID 2380 wrote to memory of 2648 2380 cmd.exe 33 PID 2380 wrote to memory of 2648 2380 cmd.exe 33 PID 2380 wrote to memory of 2648 2380 cmd.exe 33 PID 2628 wrote to memory of 2652 2628 cmd.exe 34 PID 2628 wrote to memory of 2652 2628 cmd.exe 34 PID 2628 wrote to memory of 2652 2628 cmd.exe 34 PID 2628 wrote to memory of 2652 2628 cmd.exe 34 PID 1936 wrote to memory of 1144 1936 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 20 PID 1936 wrote to memory of 1144 1936 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 20 PID 1936 wrote to memory of 1144 1936 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 20 PID 1936 wrote to memory of 1144 1936 0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v msmmsgr /t REG_SZ /d "C:\Windows\TEMP\x\services.exe" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v msmmsgr /t REG_SZ /d "C:\Windows\TEMP\x\services.exe" /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v ctfmon /t REG_SZ /d "C:\Windows\TEMP\services.exe" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v ctfmon /t REG_SZ /d "C:\Windows\TEMP\services.exe" /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:2652
-
-
-
C:\Users\Admin\AppData\Local\Temp\0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0dfa7c02f4bc82b81e87744634dd3285_JaffaCakes118.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1936
-
-