Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
2b02ebb2431990da3aa22dda5d73ab88_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2b02ebb2431990da3aa22dda5d73ab88_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2b02ebb2431990da3aa22dda5d73ab88_JaffaCakes118.exe
-
Size
304KB
-
MD5
2b02ebb2431990da3aa22dda5d73ab88
-
SHA1
45e6df4c6d3f61a89df5a7693899cf2b3dc634ea
-
SHA256
0491afadbe9f4b3edb9905f6f590776f58a90d29ba64d0a87c4b76477616406c
-
SHA512
22caa3dd6b7769b5e47993efd39fae155f8f225c330e1612e45d4615845db1dce819b5fdca9305480790ccd17408baece6c379bd3558fc25a495049e41f57930
-
SSDEEP
6144:FQgd1vXxMhNn5wI9ox2aIAHR14ULAMqMzajgkK6Gl/3hIacjA1O:qCdBUNaIO48LACWxjGlfuA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2908 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2852 fkevenm.exe -
Loads dropped DLL 3 IoCs
pid Process 2908 cmd.exe 2908 cmd.exe 2852 fkevenm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 848 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2736 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 848 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe 2852 fkevenm.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2908 2172 2b02ebb2431990da3aa22dda5d73ab88_JaffaCakes118.exe 29 PID 2172 wrote to memory of 2908 2172 2b02ebb2431990da3aa22dda5d73ab88_JaffaCakes118.exe 29 PID 2172 wrote to memory of 2908 2172 2b02ebb2431990da3aa22dda5d73ab88_JaffaCakes118.exe 29 PID 2172 wrote to memory of 2908 2172 2b02ebb2431990da3aa22dda5d73ab88_JaffaCakes118.exe 29 PID 2908 wrote to memory of 848 2908 cmd.exe 31 PID 2908 wrote to memory of 848 2908 cmd.exe 31 PID 2908 wrote to memory of 848 2908 cmd.exe 31 PID 2908 wrote to memory of 848 2908 cmd.exe 31 PID 2908 wrote to memory of 2736 2908 cmd.exe 33 PID 2908 wrote to memory of 2736 2908 cmd.exe 33 PID 2908 wrote to memory of 2736 2908 cmd.exe 33 PID 2908 wrote to memory of 2736 2908 cmd.exe 33 PID 2908 wrote to memory of 2852 2908 cmd.exe 34 PID 2908 wrote to memory of 2852 2908 cmd.exe 34 PID 2908 wrote to memory of 2852 2908 cmd.exe 34 PID 2908 wrote to memory of 2852 2908 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b02ebb2431990da3aa22dda5d73ab88_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2b02ebb2431990da3aa22dda5d73ab88_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2172 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\2b02ebb2431990da3aa22dda5d73ab88_JaffaCakes118.exe" & start C:\Users\Admin\AppData\Local\fkevenm.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 21723⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:2736
-
-
C:\Users\Admin\AppData\Local\fkevenm.exeC:\Users\Admin\AppData\Local\fkevenm.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304KB
MD52b02ebb2431990da3aa22dda5d73ab88
SHA145e6df4c6d3f61a89df5a7693899cf2b3dc634ea
SHA2560491afadbe9f4b3edb9905f6f590776f58a90d29ba64d0a87c4b76477616406c
SHA51222caa3dd6b7769b5e47993efd39fae155f8f225c330e1612e45d4615845db1dce819b5fdca9305480790ccd17408baece6c379bd3558fc25a495049e41f57930