Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
21f78d17970cec7882759045f9d43214_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
21f78d17970cec7882759045f9d43214_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
21f78d17970cec7882759045f9d43214_JaffaCakes118.exe
-
Size
629KB
-
MD5
21f78d17970cec7882759045f9d43214
-
SHA1
344917723b914a25ffb322b1a4857234079da0c4
-
SHA256
f35f6362d5422c9bfd185631f18fe25df811ed2ef04fc878385535dbca375241
-
SHA512
328295c090412460ed919ab08833eae70ec6a8019966704482361058a170e6928470eaf0a2c82b72b73b4f7ed53bb1a54e431d44df45dde997bd991de452140f
-
SSDEEP
12288:keuECrR1RtC+h8mbEkizjWl2hhZSRhO+o9PvjxFJBzi8g5KYGOnH:zaRDtlVgkizjWchzddPvFJW8EGM
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2424-8-0x0000000000400000-0x00000000004E6000-memory.dmp upx behavioral1/memory/2424-9-0x0000000000400000-0x00000000004E6000-memory.dmp upx -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2424-8-0x0000000000400000-0x00000000004E6000-memory.dmp autoit_exe behavioral1/memory/2424-9-0x0000000000400000-0x00000000004E6000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe 2424 21f78d17970cec7882759045f9d43214_JaffaCakes118.exe