Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 01:23
Behavioral task
behavioral1
Sample
372e645ae6cf495deae0468dff16f76f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
372e645ae6cf495deae0468dff16f76f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
372e645ae6cf495deae0468dff16f76f_JaffaCakes118.exe
-
Size
365KB
-
MD5
372e645ae6cf495deae0468dff16f76f
-
SHA1
52cb8ddf3af069106ef21fe0d67e991d12eeac53
-
SHA256
3803e8cff40478f59b62cb68ac5dc4bdff6a804723e0bb0ceb058d5f6bd34cb0
-
SHA512
c23242820e9ea6b92e02565e0fa7cf2fb1177c93fc4f0d2d759b6caa119a575cbb7bc2c1cc7b1316475e7536d51f9c152ee05c55a45ae9ba0d1589c25549ba9e
-
SSDEEP
6144:ee9QkAWMCyfZ/qrwR6UGG+aPx7aCTVJd9Me4s/X5iuhYm3XF17+lLuLSTzI3KhS0:nM7ZCrQzJHMed876r0LiGI3KhSZYtiv2
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1672-0-0x0000000001000000-0x0000000001083000-memory.dmp upx behavioral1/memory/1672-1-0x0000000001000000-0x0000000001083000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2540 1672 372e645ae6cf495deae0468dff16f76f_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2540 1672 372e645ae6cf495deae0468dff16f76f_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2540 1672 372e645ae6cf495deae0468dff16f76f_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2540 1672 372e645ae6cf495deae0468dff16f76f_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2540 1672 372e645ae6cf495deae0468dff16f76f_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2540 1672 372e645ae6cf495deae0468dff16f76f_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2540 1672 372e645ae6cf495deae0468dff16f76f_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\372e645ae6cf495deae0468dff16f76f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\372e645ae6cf495deae0468dff16f76f_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" firewall.cpl,ShowControlPanel2⤵PID:2540
-