Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
335212051c562ed029079eecd00c3393_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
335212051c562ed029079eecd00c3393_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
335212051c562ed029079eecd00c3393_JaffaCakes118.exe
-
Size
32KB
-
MD5
335212051c562ed029079eecd00c3393
-
SHA1
3e4a5e3bc534734078231e1d6d53d75633b2bb11
-
SHA256
50f32726b78e6a41aa2e9f77a192492118a61b1ee041be8ab896aa5ae793cef3
-
SHA512
ae2bbe59874d4e692bfc8264d64df9eea78f2803042f4eb6da2e4dcb65ca010d482d992f0bddff3371d5787e979d6b04d232f72d6f5aa13b6a03838b30767ff6
-
SSDEEP
384:LrXeSv+0sexD/s7b7Go/gkZlWGlVgoY1ZBZ4qhnYKTOH:LLeSG0scqPGo/g8lWGUoqhYKT+
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2200 set thread context of 2696 2200 335212051c562ed029079eecd00c3393_JaffaCakes118.exe 30 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2200 335212051c562ed029079eecd00c3393_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2696 2200 335212051c562ed029079eecd00c3393_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2696 2200 335212051c562ed029079eecd00c3393_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2696 2200 335212051c562ed029079eecd00c3393_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2696 2200 335212051c562ed029079eecd00c3393_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2696 2200 335212051c562ed029079eecd00c3393_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2696 2200 335212051c562ed029079eecd00c3393_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2696 2200 335212051c562ed029079eecd00c3393_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2696 2200 335212051c562ed029079eecd00c3393_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\335212051c562ed029079eecd00c3393_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\335212051c562ed029079eecd00c3393_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\335212051c562ed029079eecd00c3393_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\335212051c562ed029079eecd00c3393_JaffaCakes118.exe"2⤵PID:2696
-