Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 14:25
Static task
static1
Behavioral task
behavioral1
Sample
165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe
-
Size
32KB
-
MD5
165424cd6c1aecf9cee9d38ee8e95233
-
SHA1
04041a854d4d5e8d05d16fd7438a5ad9ee1d871b
-
SHA256
e74ed7ccc7fb53bafb714695c3c67125a3d157f5f64712cedea50e198ea724bc
-
SHA512
8d704027d4ac589d95fc297b2afcae158ad9f2659b9186f3048bd4493d24b3660fafac39b85cc200128c672fccbcbf28a407469b50446802a56f27503af23a73
-
SSDEEP
384:Xcr9KZurWZKuYAWwRJ64XNLYtKi/TE+kOjk0Un1pDhHugvdukDGSne74:XsewJU649LYKr+Un1ugvE+Be7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2796 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2936 tasklist.exe 2920 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2920 tasklist.exe Token: SeDebugPrivilege 2936 tasklist.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2212 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe 2212 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2768 2212 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe 32 PID 2212 wrote to memory of 2768 2212 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe 32 PID 2212 wrote to memory of 2768 2212 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe 32 PID 2212 wrote to memory of 2768 2212 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe 32 PID 2212 wrote to memory of 2796 2212 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe 34 PID 2212 wrote to memory of 2796 2212 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe 34 PID 2212 wrote to memory of 2796 2212 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe 34 PID 2212 wrote to memory of 2796 2212 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe 34 PID 2768 wrote to memory of 2936 2768 cmd.exe 37 PID 2768 wrote to memory of 2936 2768 cmd.exe 37 PID 2768 wrote to memory of 2936 2768 cmd.exe 37 PID 2768 wrote to memory of 2936 2768 cmd.exe 37 PID 2796 wrote to memory of 2920 2796 cmd.exe 36 PID 2796 wrote to memory of 2920 2796 cmd.exe 36 PID 2796 wrote to memory of 2920 2796 cmd.exe 36 PID 2796 wrote to memory of 2920 2796 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.com2⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-