Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 10:34
Static task
static1
Behavioral task
behavioral1
Sample
345e12b08d46b271fb34511007ade577_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
345e12b08d46b271fb34511007ade577_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
345e12b08d46b271fb34511007ade577_JaffaCakes118.exe
-
Size
256KB
-
MD5
345e12b08d46b271fb34511007ade577
-
SHA1
01c91e937104599ba905d6fd15f13787d8af3cfe
-
SHA256
19bfd41a17c8a1748c4c4f41c73110d3da3ca7757c47abf7f7fc0043e2fdae29
-
SHA512
38682a15fbc32707071fd89b1c08d96604138a9796c8ce9411d600947df771f09df43a351af9e1bc50262452bfbff5163f3290a4161e5a0a76098c7264bbd720
-
SSDEEP
6144:uwtOtj7Uc0UBJ1XiLbowDtfnPmhcIWEl2nQ/ntNGQDgC:G7Uc0UBJhwfsesb/ntNP
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\7U3F:jMHvBJV9po = "C:\\Users\\Admin\\AppData\\Local\\Temp\\345e12b08d46b271fb34511007ade577_JaffaCakes118.exe" 345e12b08d46b271fb34511007ade577_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2564 345e12b08d46b271fb34511007ade577_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2720 2564 345e12b08d46b271fb34511007ade577_JaffaCakes118.exe 32 PID 2564 wrote to memory of 2720 2564 345e12b08d46b271fb34511007ade577_JaffaCakes118.exe 32 PID 2564 wrote to memory of 2720 2564 345e12b08d46b271fb34511007ade577_JaffaCakes118.exe 32 PID 2564 wrote to memory of 2720 2564 345e12b08d46b271fb34511007ade577_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\345e12b08d46b271fb34511007ade577_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\345e12b08d46b271fb34511007ade577_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\gpdelrec.bat2⤵PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD5ea9a826a793bd6e7a3ef2d4403a63f3e
SHA191a6b1cb7633a6a9483562d35db8650942dffd98
SHA25658d93e37de7c47d4b18921dd746394612ba71c3031cfedd05e708e934a51542e
SHA512ae1d4a7a01883b741c43a914fb955379210cc18bb703d55a5938460a36ca6169fa5e8c3d330479133a830a8dea9465547ddf8372c9c3c42310bfe466d46fe024