Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 12:21
Static task
static1
Behavioral task
behavioral1
Sample
22616cd11e8369815965211071778a31_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
22616cd11e8369815965211071778a31_JaffaCakes118.exe
-
Size
186KB
-
MD5
22616cd11e8369815965211071778a31
-
SHA1
dcd4aa5174031c97ad5a16aea0f3ca201412d295
-
SHA256
84b1532207c2c125388f8f576708b96bacc3dd31de9c41f64edf0a083cf9f1a3
-
SHA512
f10832b8701e2ee5355a5b641f5a0cc96b2d9dd7986c4082f9008df32631084c82acca2bf46af02b3b6505ce41948e02dea1d8024ab06a0800f07cf53d1924f4
-
SSDEEP
3072:6IJ08+joCgu6ODtWgpwX11JXKHgGNfhKeG/4IlEVDnx7M9FPaQS8UpyZPS3ekq24:6IS8wR6rJpKAGNfMRCLmnaV8Iyp63q2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2420-2-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3004-12-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2420-77-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2392-80-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2392-78-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2420-186-0x0000000000400000-0x0000000000471000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2420 wrote to memory of 3004 2420 22616cd11e8369815965211071778a31_JaffaCakes118.exe 28 PID 2420 wrote to memory of 3004 2420 22616cd11e8369815965211071778a31_JaffaCakes118.exe 28 PID 2420 wrote to memory of 3004 2420 22616cd11e8369815965211071778a31_JaffaCakes118.exe 28 PID 2420 wrote to memory of 3004 2420 22616cd11e8369815965211071778a31_JaffaCakes118.exe 28 PID 2420 wrote to memory of 2392 2420 22616cd11e8369815965211071778a31_JaffaCakes118.exe 30 PID 2420 wrote to memory of 2392 2420 22616cd11e8369815965211071778a31_JaffaCakes118.exe 30 PID 2420 wrote to memory of 2392 2420 22616cd11e8369815965211071778a31_JaffaCakes118.exe 30 PID 2420 wrote to memory of 2392 2420 22616cd11e8369815965211071778a31_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\22616cd11e8369815965211071778a31_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\22616cd11e8369815965211071778a31_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\22616cd11e8369815965211071778a31_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\22616cd11e8369815965211071778a31_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\22616cd11e8369815965211071778a31_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\22616cd11e8369815965211071778a31_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD511d07518e583c2fa518274ef8b60fb89
SHA1dca6014d7c9e642e1292a3ac0a0d88f55baf8817
SHA2565c6cf43907cbdc3dae4b371efcdf6137bf6fd8a61b658e1681f137cc085f6a8d
SHA5120030252633cd77569495bc1c8557dd828394266685b5ce01e212481a6abb3b35fd13585b015d4e1febeda8c3ba9e8521c486445dfd929d8b4a3888175b771141
-
Filesize
1KB
MD5c897810c2541fd256d82ec08e98acd7a
SHA136aaeb557bd4c7125224567d9ef9fe93307edb91
SHA256289d5d8b45edd87a03682f9c7ea7441ae715b7ce812b1a7d1d014d94dc5162d7
SHA512c77bea83e5d2c55aa918725197b6d2f3ebd4b9f9afaf4fe96f72c913c6fd531683d0c7290f174c92e4f8d6977d649e3928212ade037278fd300c9641b2827d76
-
Filesize
600B
MD546429c3544d2a7fa7bba0c0226792091
SHA1942e1c1f7541f507a8019155576bd1d7497eb7ac
SHA2562410316c6ca016901cbcd7ac57b44b7da3f10300dc603621e1986fa7e3c589fe
SHA5127b1696b03cb1907ae12ae5f0220419a5eb551a52faef2f55c06a828d37da713fdc0e686868d4873782aeeabb0721abbc50afb7f21ea5811afb030673b2e79319
-
Filesize
996B
MD56f83d25dcdc148efb2ba9fc09f501140
SHA1e175950dfd0905022d1655d174821974ce94c564
SHA2562c61e12ab1501c3e2b7818eb29bf50bf727c715e61a69b791adf91d0b5c59fa4
SHA5127af097325d694db00c8909c2ef597fcb2a928f2511d4c3b8bcc1dd2cbc70046f975c35ca2f978131d64f9b2bc7930ab5461e594fda3c662b1549089fb668ec52