Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 01:09
Behavioral task
behavioral1
Sample
2a7307f38b156f09dcc835e421de9550_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a7307f38b156f09dcc835e421de9550_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2a7307f38b156f09dcc835e421de9550_JaffaCakes118.exe
-
Size
109KB
-
MD5
2a7307f38b156f09dcc835e421de9550
-
SHA1
613f3fe329dc22626599d1926aff8273091c8c74
-
SHA256
deecbd30492fbcb6c5c48c2fef3deb21ec86f483c6a196af454a007f0fab5740
-
SHA512
ff4fd3eccdbe4d77dee3eb6e2fcddb1a8ed28b0353b733ff8f0b1b914ecc892472951e34663211cba428ea543318107287c5a3f5d0963e95cad204779c3cd02e
-
SSDEEP
3072:no2YLdVjRx/bKmMyapopKUzf2QppKUzf2Q/x:jyVVx/vMyapoU02CU02c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2292 6.exe -
Loads dropped DLL 2 IoCs
pid Process 2300 2a7307f38b156f09dcc835e421de9550_JaffaCakes118.exe 2300 2a7307f38b156f09dcc835e421de9550_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2300-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2300-16-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\addins\__tmp_rar_sfx_access_check_259432704 2a7307f38b156f09dcc835e421de9550_JaffaCakes118.exe File created C:\Windows\addins\SERVER& MesHoOo.exe 2a7307f38b156f09dcc835e421de9550_JaffaCakes118.exe File opened for modification C:\Windows\addins\SERVER& MesHoOo.exe 2a7307f38b156f09dcc835e421de9550_JaffaCakes118.exe File created C:\Windows\addins\6.exe 2a7307f38b156f09dcc835e421de9550_JaffaCakes118.exe File opened for modification C:\Windows\addins\6.exe 2a7307f38b156f09dcc835e421de9550_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2292 6.exe 2292 6.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2292 2300 2a7307f38b156f09dcc835e421de9550_JaffaCakes118.exe 30 PID 2300 wrote to memory of 2292 2300 2a7307f38b156f09dcc835e421de9550_JaffaCakes118.exe 30 PID 2300 wrote to memory of 2292 2300 2a7307f38b156f09dcc835e421de9550_JaffaCakes118.exe 30 PID 2300 wrote to memory of 2292 2300 2a7307f38b156f09dcc835e421de9550_JaffaCakes118.exe 30 PID 2292 wrote to memory of 1196 2292 6.exe 21 PID 2292 wrote to memory of 1196 2292 6.exe 21 PID 2292 wrote to memory of 1196 2292 6.exe 21 PID 2292 wrote to memory of 1196 2292 6.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\2a7307f38b156f09dcc835e421de9550_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a7307f38b156f09dcc835e421de9550_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\WINDOWS\addins\6.exe"C:\WINDOWS\addins\6.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2292
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD52f4d7f8aaf1159c1ac9aeecc29efc16b
SHA1953e8ca8d7dac80993b11c020b013f336bc24812
SHA256b6cfc148d216abce314cdf921d107f7a06df567bf170a0d49f7b341549f7ab8a
SHA5123803a81bb0303ba55e718da159eab3ae29e5c6b26e873d9e8e36beb71dcfbd15f2b49b71414fda949efe82773644b8703140a2a808a13dd1e1328bdf7b124405