Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
36174c5f29b776fe7098fbd33092d01b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
36174c5f29b776fe7098fbd33092d01b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
36174c5f29b776fe7098fbd33092d01b_JaffaCakes118.exe
-
Size
744KB
-
MD5
36174c5f29b776fe7098fbd33092d01b
-
SHA1
2c677b4c977267db9828ae7e86b287c843bba049
-
SHA256
49a378a9001f005fbd3c9839d71e5845ebc9347229bec7c1ec6126b6daeccac2
-
SHA512
05781ff399edcd53d38e785bd9919cab5eec940b1d95d44f363a791380b1c101222514a0d69ca6d4df645f62b6c1c9befcec2731d3f17d1bb92d16c84c285043
-
SSDEEP
12288:fRn8S++U4u/n/80dW5A0zyk6JwQ5oAlK+GbRvZBIka+QQ52LYRg0EyPwrRxt:J8MU4ufxdW5A2CJr/khRv7Ika8PY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2936 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 Hacker.com.cn.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PRogram Files\Hacker.com.cn.exe 36174c5f29b776fe7098fbd33092d01b_JaffaCakes118.exe File opened for modification C:\PRogram Files\Hacker.com.cn.exe 36174c5f29b776fe7098fbd33092d01b_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\61642520.BAT 36174c5f29b776fe7098fbd33092d01b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1496 36174c5f29b776fe7098fbd33092d01b_JaffaCakes118.exe Token: SeDebugPrivilege 2316 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2816 2316 Hacker.com.cn.exe 31 PID 2316 wrote to memory of 2816 2316 Hacker.com.cn.exe 31 PID 2316 wrote to memory of 2816 2316 Hacker.com.cn.exe 31 PID 2316 wrote to memory of 2816 2316 Hacker.com.cn.exe 31 PID 1496 wrote to memory of 2936 1496 36174c5f29b776fe7098fbd33092d01b_JaffaCakes118.exe 32 PID 1496 wrote to memory of 2936 1496 36174c5f29b776fe7098fbd33092d01b_JaffaCakes118.exe 32 PID 1496 wrote to memory of 2936 1496 36174c5f29b776fe7098fbd33092d01b_JaffaCakes118.exe 32 PID 1496 wrote to memory of 2936 1496 36174c5f29b776fe7098fbd33092d01b_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\36174c5f29b776fe7098fbd33092d01b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\36174c5f29b776fe7098fbd33092d01b_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\61642520.BAT2⤵
- Deletes itself
PID:2936
-
-
C:\PRogram Files\Hacker.com.cn.exe"C:\PRogram Files\Hacker.com.cn.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2816
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744KB
MD536174c5f29b776fe7098fbd33092d01b
SHA12c677b4c977267db9828ae7e86b287c843bba049
SHA25649a378a9001f005fbd3c9839d71e5845ebc9347229bec7c1ec6126b6daeccac2
SHA51205781ff399edcd53d38e785bd9919cab5eec940b1d95d44f363a791380b1c101222514a0d69ca6d4df645f62b6c1c9befcec2731d3f17d1bb92d16c84c285043
-
Filesize
218B
MD5001d585fd2ecd005273c4a1fbeb370c7
SHA17f06944d2c4f18e436e71d2f49ceb7ff1a9f2c0c
SHA2564fb45f48510838589e2cbad199c5daaac3e1a7a71161048938703556b409979a
SHA512fb4e7a4d0cad934c4dc6eca2681277d397289f741d5125a36567c217d1cbc3b38e0c2e4c291ef7e091ff5bc19f5c36831b84c54e793be5910179d0992c545949