Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05/07/2024, 08:50

General

  • Target

    26cc69243b390c69c10208d11f8effae_JaffaCakes118.exe

  • Size

    52KB

  • MD5

    26cc69243b390c69c10208d11f8effae

  • SHA1

    5e372d0eeaef48ec6c5d8143834abd48a9dda488

  • SHA256

    5d92c083f796a884d07e153b3402c25c62d039b8702c8ba3b8a73108616b7841

  • SHA512

    384be9f988c43dc5e0ee6324e27991fc02f81bd75716372193e527aba4d407e091e1bd7bfc7758773b6af138f308fbc7897084a8ba99b7007e8b0ee24ab924d3

  • SSDEEP

    768:P3tsw1Hs9ay2addEr11UVoD6HbPIziS/CZdH03UMMAh8NfiZgzts:Pt3HED2mEr1KVE6rDJGT3h8N2gG

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26cc69243b390c69c10208d11f8effae_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\26cc69243b390c69c10208d11f8effae_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Users\Admin\AppData\Local\Temp\26cc69243b390c69c10208d11f8effae_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\26cc69243b390c69c10208d11f8effae_JaffaCakes118.exe
      2⤵
        PID:2728
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\melt1.bat
        2⤵
        • Deletes itself
        PID:2828

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\melt1.bat

      Filesize

      285B

      MD5

      e66b6aefa73b65714854f6f5e4a8f73a

      SHA1

      6eed42c8a25d4c2b37c949471099011e66021d3a

      SHA256

      2e033344df068b1b69f3d39244737faaf42dba1df05cec5fc9edb948790ae060

      SHA512

      926ba461f49c0a4753f50e9fd847fdc411ccf7c0f203317c17a64c6adec19e6d75f221bc606caa276dbf4d23b0d4d80cff9fd8eeda884a09e091808d3ecd3f84

    • memory/2728-2-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2728-3-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2728-4-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2728-9-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2728-6-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2728-14-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2728-18-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2728-17-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2728-11-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB