Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 07:58
Behavioral task
behavioral1
Sample
153d53015abd0efe160166982eb29429_JaffaCakes118.exe
Resource
win7-20240611-en
6 signatures
150 seconds
General
-
Target
153d53015abd0efe160166982eb29429_JaffaCakes118.exe
-
Size
470KB
-
MD5
153d53015abd0efe160166982eb29429
-
SHA1
c2e2764b0a76a6f2a2f56d1b1d07ef721aea9248
-
SHA256
289f90c5e72c7c2c577d8e10ee7a4ae31cf803c3fa9b38f1795b208d7de8db7f
-
SHA512
fe0a38417027e766bb91ae2d3504d4f5781d5e3a78f8ce35c31710d6de22b0a71fa3fbf7a4457ae653152b074b7476dd62cc53362ee0141052b40f765c1f695e
-
SSDEEP
12288:03bApkUeohhz0g2g9Fs14jlXsz7jYbVWpG:2LDojdy14JXsM
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2416-0-0x0000000000400000-0x00000000004F5000-memory.dmp upx behavioral1/memory/2416-2-0x0000000000400000-0x00000000004F5000-memory.dmp upx behavioral1/memory/2416-5-0x0000000000400000-0x00000000004F5000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 153d53015abd0efe160166982eb29429_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main 153d53015abd0efe160166982eb29429_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 153d53015abd0efe160166982eb29429_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2416 153d53015abd0efe160166982eb29429_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2416 153d53015abd0efe160166982eb29429_JaffaCakes118.exe 2416 153d53015abd0efe160166982eb29429_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\153d53015abd0efe160166982eb29429_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\153d53015abd0efe160166982eb29429_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2416