Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 01:25
Static task
static1
Behavioral task
behavioral1
Sample
32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe
-
Size
34KB
-
MD5
32c5d755969a06e18e758d7c5a2727fa
-
SHA1
21249332e93c7c1ceef638c90ce281d78139818b
-
SHA256
89d0d21ef961666237d50fb7026618402401e1725576d62722208dfbea105e8a
-
SHA512
25dbb77e386163e75c197421639bcaf4aa5e40bbdc8e0ffc72d3351773ad98153561a3a0e45a103d705816c514ac2d102cf26393a5fc00062b6819f2a4d6ab54
-
SSDEEP
768:lziKS9wcQTBLy/fOjMlFTJue9XxkoS52HA:lziKaU8/6o3JxOk
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2220 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe Optimizer = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\clocksytem.exe\"" 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2220 set thread context of 2764 2220 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 30 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2220 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 2220 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 2764 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 2764 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 2764 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2764 2220 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2764 2220 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2764 2220 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2764 2220 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2764 2220 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2764 2220 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2764 2220 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2764 2220 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\32c5d755969a06e18e758d7c5a2727fa_JaffaCakes1182⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD59b98d47916ead4f69ef51b56b0c2323c
SHA1290a80b4ded0efc0fd00816f373fcea81a521330
SHA25696e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b
SHA51268b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94