Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 11:55
Static task
static1
Behavioral task
behavioral1
Sample
3d471a83ed7c39a7c1c6c30f542f690c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3d471a83ed7c39a7c1c6c30f542f690c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3d471a83ed7c39a7c1c6c30f542f690c_JaffaCakes118.exe
-
Size
106KB
-
MD5
3d471a83ed7c39a7c1c6c30f542f690c
-
SHA1
0095881939a2373587992c8630da1ccbc5cd5061
-
SHA256
7fc57190388ab4a4454026b364d9a58a3ed0a193282500542a09984c12002532
-
SHA512
f7550e10d7069b057ca6518dc040c8ddbe5edd6680325c615051d33464535b36bc69318dc85aee7a161f9afd57305abe8163b9dc5fabba8b7d941a4d5934a542
-
SSDEEP
768:ovAbpyCVU4NGMMD3016VY1q/miAK7TubFBCLmRdnukufMZg+sddagY8WL:oIdfgD3//zTACWZuDEZPseMWL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2772 explore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2772 explore.exe 2772 explore.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2772 2436 3d471a83ed7c39a7c1c6c30f542f690c_JaffaCakes118.exe 30 PID 2436 wrote to memory of 2772 2436 3d471a83ed7c39a7c1c6c30f542f690c_JaffaCakes118.exe 30 PID 2436 wrote to memory of 2772 2436 3d471a83ed7c39a7c1c6c30f542f690c_JaffaCakes118.exe 30 PID 2436 wrote to memory of 2772 2436 3d471a83ed7c39a7c1c6c30f542f690c_JaffaCakes118.exe 30 PID 2772 wrote to memory of 1188 2772 explore.exe 21 PID 2772 wrote to memory of 1188 2772 explore.exe 21 PID 2772 wrote to memory of 1188 2772 explore.exe 21 PID 2772 wrote to memory of 1188 2772 explore.exe 21 PID 2772 wrote to memory of 1188 2772 explore.exe 21 PID 2772 wrote to memory of 1188 2772 explore.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\3d471a83ed7c39a7c1c6c30f542f690c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d471a83ed7c39a7c1c6c30f542f690c_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\explore.exe"C:\Users\Admin\AppData\Local\Temp\explore.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD53b176b217b93eac55225db0d258e7978
SHA1cffe9297e90eadca5f13b6be894fa92f36112120
SHA25621548c95754b64596917376fa61dce24519d6532342708aef4c5359d9f53f44a
SHA51263a01c711e0dda23c78cbf4fd912b6b0d95c55bbdb9d2dc84533252263de8fed8a25e5f04917d2023d80a45618ac867fd42130d35dbdf197851f5924ed674223