Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
3ce34cd6be31ffd7f165700ebe220c07_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ce34cd6be31ffd7f165700ebe220c07_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3ce34cd6be31ffd7f165700ebe220c07_JaffaCakes118.exe
-
Size
162KB
-
MD5
3ce34cd6be31ffd7f165700ebe220c07
-
SHA1
b5a9821960bc63957ce2855562d7a4524ef04371
-
SHA256
04bc88ddbbf3d087002c780ed47cbcf5b3176c26d266e3a56870c3de47a6f08f
-
SHA512
1ccaa2e25b664a3bc92ae6b3d6643c4fbb1ff1c3035e9208503bff9ef9a759a624e8a8611c0afc45daa9e0e6c7f58e2e28ffa1b225f91f2b38d73efd667856fd
-
SSDEEP
3072:AHOef1VXAuD1fY8Z6iLMDzK5YMwF9fCUFgvYrrsnTFADdWdvdpa80DSCegqTX:AHOesu1S+MqyMwFRCUFUYroeDdK+fpeV
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" 3ce34cd6be31ffd7f165700ebe220c07_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3044-1-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2764-4-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2764-6-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/3044-74-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2088-81-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/3044-83-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/3044-177-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/3044-182-0x0000000000400000-0x000000000048A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2764 3044 3ce34cd6be31ffd7f165700ebe220c07_JaffaCakes118.exe 30 PID 3044 wrote to memory of 2764 3044 3ce34cd6be31ffd7f165700ebe220c07_JaffaCakes118.exe 30 PID 3044 wrote to memory of 2764 3044 3ce34cd6be31ffd7f165700ebe220c07_JaffaCakes118.exe 30 PID 3044 wrote to memory of 2764 3044 3ce34cd6be31ffd7f165700ebe220c07_JaffaCakes118.exe 30 PID 3044 wrote to memory of 2088 3044 3ce34cd6be31ffd7f165700ebe220c07_JaffaCakes118.exe 32 PID 3044 wrote to memory of 2088 3044 3ce34cd6be31ffd7f165700ebe220c07_JaffaCakes118.exe 32 PID 3044 wrote to memory of 2088 3044 3ce34cd6be31ffd7f165700ebe220c07_JaffaCakes118.exe 32 PID 3044 wrote to memory of 2088 3044 3ce34cd6be31ffd7f165700ebe220c07_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ce34cd6be31ffd7f165700ebe220c07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3ce34cd6be31ffd7f165700ebe220c07_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\3ce34cd6be31ffd7f165700ebe220c07_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3ce34cd6be31ffd7f165700ebe220c07_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\3ce34cd6be31ffd7f165700ebe220c07_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3ce34cd6be31ffd7f165700ebe220c07_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD5b106c9116bb72c6d57e518c9e726e37c
SHA110d6d654abbea52b802eea6d3b9d2ead74cf7814
SHA256cc9dc880b21c9628c81ca60494f0df94d5871dd85d962912f8156ea9c9b33666
SHA5128a1aa4f587ee55d45bb47610f5aa60ca11055f49c894479e31c60e7e7b6aec581a65f6a894df9ee5f7f3c1ead18e31bf652ef53a4764571bb0e5257989345322
-
Filesize
1KB
MD554df5933b513c3d54b2dc373bb833f58
SHA1bdb0074821bbfe9e6fae0db6be209a4c31710abd
SHA2563e7dbba19fc6143087469898b2bfa2f643afbcbfac6b0bca85042a546953fd88
SHA512b4663b694be728baf8cc2a830f0cf194fd92b87ceed077422d8bfeb495e09d1bc85cd42b12b3e95f65f853b730847e976cad3ff4dc0b61c1850ab1f081068291
-
Filesize
600B
MD564146c0ac976c49d7d030d43d0204e19
SHA16d025d5f24d2778ccf1c6b17858b8d7075615203
SHA256915d1bb41253819ceba72844608fa6a7178289ade980fed2f7cc49ef8f58f298
SHA512581d084de637e258d49b030524f68981244cd4e0bb4e2c20046ad4b7fca2d1b59764f0bcb32e25564e7cd8389cd9417c44520a54471982a1c0ebe5dfb6e1d9ee
-
Filesize
996B
MD573d4f2fdee55ee40c99181585b9bd935
SHA18096392924d79bb8137486bb0de1f32f0b1cdc5b
SHA2565d97781c2d176740af5fbc8c50fcd7182b98babe4fef07ceecfb28600a42d95f
SHA51210f4cb9b089207c8341ff485c65b24425149fb23e963ef4fc863e1eb5012ce67d9c54a984fbb250e6888b0438a62fe98a9dbdf09bb3a09c208f9978af5da4dfa