Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 03:57
Behavioral task
behavioral1
Sample
14986692a6fc5bc7442950b056b1037e_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
14986692a6fc5bc7442950b056b1037e_JaffaCakes118.exe
-
Size
386KB
-
MD5
14986692a6fc5bc7442950b056b1037e
-
SHA1
a6f5600e87ae09b1c4cd694cac55084986ed3299
-
SHA256
4e23a91c94eb06e6e0b4a303f9fd9126cb74d6226168cdd3383db1c8901f27a9
-
SHA512
402901293ae900dbf28e1580ecbfaa5db88c0a0349dbb4cc2595359a6dab942ebba3d6824a4015afe5d27a1a06c5373221106cc4497b9307c889d969c1da7dc4
-
SSDEEP
12288:59xZ5yN3Cwaw//ikDju436I26h+OoS9Ot6:59vsky/7NKDm+16
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2968-0-0x00000000003C0000-0x000000000050F000-memory.dmp upx behavioral1/memory/2968-1-0x00000000003C0000-0x000000000050F000-memory.dmp upx behavioral1/files/0x003300000001416f-11.dat upx behavioral1/memory/2968-12-0x00000000003C0000-0x000000000050F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2632 2968 14986692a6fc5bc7442950b056b1037e_JaffaCakes118.exe 28 PID 2968 wrote to memory of 2632 2968 14986692a6fc5bc7442950b056b1037e_JaffaCakes118.exe 28 PID 2968 wrote to memory of 2632 2968 14986692a6fc5bc7442950b056b1037e_JaffaCakes118.exe 28 PID 2968 wrote to memory of 2632 2968 14986692a6fc5bc7442950b056b1037e_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\14986692a6fc5bc7442950b056b1037e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14986692a6fc5bc7442950b056b1037e_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\106.bat2⤵PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177B
MD512b224bef283bd501d2263c5a3a71cc4
SHA1d6a8abc216ba27906880e8bbc1fc7dbd84dad4b1
SHA256dbac086d86a9718280c2b23c5bf175fc99359ce09907aa6fb5a54c9e50e36bf9
SHA5126889a018f8931876c23025a6ee749ca40b6f576a8177d94afa6c51021a7334abf37283d8ff4d35a3e79bb7d17b500c7e9886fe93e9c13a65818954ecafbaa04e
-
Filesize
386KB
MD514986692a6fc5bc7442950b056b1037e
SHA1a6f5600e87ae09b1c4cd694cac55084986ed3299
SHA2564e23a91c94eb06e6e0b4a303f9fd9126cb74d6226168cdd3383db1c8901f27a9
SHA512402901293ae900dbf28e1580ecbfaa5db88c0a0349dbb4cc2595359a6dab942ebba3d6824a4015afe5d27a1a06c5373221106cc4497b9307c889d969c1da7dc4