Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
3139018ca41e02fb76316120f090b3fd_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3139018ca41e02fb76316120f090b3fd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3139018ca41e02fb76316120f090b3fd_JaffaCakes118.exe
-
Size
52KB
-
MD5
3139018ca41e02fb76316120f090b3fd
-
SHA1
c5a7948c2ba2cacd0eab94dc8e037ddf29080b78
-
SHA256
90827f230bf64f2efa1ab6097e8f9872c39cb462ca007fa50560f168464218ef
-
SHA512
eb3c6320c205d8caeb732736ff7063510420dfdcbb8277930f0a051a61035273b8aabe68a3f9b3f27d291350b1fc0681f5c1c21f0a927e29284a882bba1c8f86
-
SSDEEP
1536:q4BcDQX2oooD+AyxArAIVJ9jQk8Xxd2PT1kYyUqJbkBDrJ0f:q46QXMmAIRQTXxcL+UqJ4tuf
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1660 3139018ca41e02fb76316120f090b3fd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2536 1660 3139018ca41e02fb76316120f090b3fd_JaffaCakes118.exe 30 PID 1660 wrote to memory of 2536 1660 3139018ca41e02fb76316120f090b3fd_JaffaCakes118.exe 30 PID 1660 wrote to memory of 2536 1660 3139018ca41e02fb76316120f090b3fd_JaffaCakes118.exe 30 PID 1660 wrote to memory of 2536 1660 3139018ca41e02fb76316120f090b3fd_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2100 2536 cmd.exe 32 PID 2536 wrote to memory of 2100 2536 cmd.exe 32 PID 2536 wrote to memory of 2100 2536 cmd.exe 32 PID 2536 wrote to memory of 2100 2536 cmd.exe 32 PID 2100 wrote to memory of 2136 2100 net.exe 33 PID 2100 wrote to memory of 2136 2100 net.exe 33 PID 2100 wrote to memory of 2136 2100 net.exe 33 PID 2100 wrote to memory of 2136 2100 net.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3139018ca41e02fb76316120f090b3fd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3139018ca41e02fb76316120f090b3fd_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop sharedaccess2⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵PID:2136
-
-
-