Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 13:15
Static task
static1
Behavioral task
behavioral1
Sample
39451765b5d2e90cceab67706671adff_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
39451765b5d2e90cceab67706671adff_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
39451765b5d2e90cceab67706671adff_JaffaCakes118.exe
-
Size
635KB
-
MD5
39451765b5d2e90cceab67706671adff
-
SHA1
980f4d1538da6b368745c404290c1886cb021bba
-
SHA256
69396884385a6f57a06486b96dc2d5d8328bdd729e9064955bee51c4d76c94b5
-
SHA512
225e2025d0b1c20d46d0fd8a98a659f381346fd136df630fc9ae412a6bf4fbe00e03595e2570a44195e48ebae2ca02f82e211f61862f620431d56a5df98638c1
-
SSDEEP
12288:DascEJ+CwihxaDPoYXIG64LzakT50F3Z4mxxGCknbPHZzOS9kRf2+lIJeG:D1Y7pDPTzn0QmXCbxOS9Cf2v
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2628 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3008 svchost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\svchost.exe 39451765b5d2e90cceab67706671adff_JaffaCakes118.exe File opened for modification C:\Windows\svchost.exe 39451765b5d2e90cceab67706671adff_JaffaCakes118.exe File created C:\Windows\uninstal.bat 39451765b5d2e90cceab67706671adff_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2696 39451765b5d2e90cceab67706671adff_JaffaCakes118.exe Token: SeDebugPrivilege 3008 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 svchost.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2584 3008 svchost.exe 31 PID 3008 wrote to memory of 2584 3008 svchost.exe 31 PID 3008 wrote to memory of 2584 3008 svchost.exe 31 PID 3008 wrote to memory of 2584 3008 svchost.exe 31 PID 2696 wrote to memory of 2628 2696 39451765b5d2e90cceab67706671adff_JaffaCakes118.exe 32 PID 2696 wrote to memory of 2628 2696 39451765b5d2e90cceab67706671adff_JaffaCakes118.exe 32 PID 2696 wrote to memory of 2628 2696 39451765b5d2e90cceab67706671adff_JaffaCakes118.exe 32 PID 2696 wrote to memory of 2628 2696 39451765b5d2e90cceab67706671adff_JaffaCakes118.exe 32 PID 2696 wrote to memory of 2628 2696 39451765b5d2e90cceab67706671adff_JaffaCakes118.exe 32 PID 2696 wrote to memory of 2628 2696 39451765b5d2e90cceab67706671adff_JaffaCakes118.exe 32 PID 2696 wrote to memory of 2628 2696 39451765b5d2e90cceab67706671adff_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\39451765b5d2e90cceab67706671adff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\39451765b5d2e90cceab67706671adff_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat2⤵
- Deletes itself
PID:2628
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2584
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
635KB
MD539451765b5d2e90cceab67706671adff
SHA1980f4d1538da6b368745c404290c1886cb021bba
SHA25669396884385a6f57a06486b96dc2d5d8328bdd729e9064955bee51c4d76c94b5
SHA512225e2025d0b1c20d46d0fd8a98a659f381346fd136df630fc9ae412a6bf4fbe00e03595e2570a44195e48ebae2ca02f82e211f61862f620431d56a5df98638c1
-
Filesize
218B
MD58c5f522d18163e9c0e0d56db447d72b9
SHA1b024f34bdd6a6874d79a18c6af772f7f7ba3e2c4
SHA256e0c04fe541ef8a92c789f958e336b691e8fb341a8463ee5c3d607a38d211a493
SHA512e505454678aff1f3482c3b272f7d872f6e807c0a46fa533f0c92a960269b3484170368cc5a32ff91dbbe7abdee5d9f121cbb073104e9c7d05c9e41712cb875f2