Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 03:10
Static task
static1
Behavioral task
behavioral1
Sample
3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe
-
Size
408KB
-
MD5
3ff524b4338d2f401259a7fccdfc1b17
-
SHA1
6afe63c39d798d6bc634347f281aec529087e66d
-
SHA256
2b88ce07a2a0e92dba8c045da70f81753d121104443549f82a16844b286f2deb
-
SHA512
d2937dad49e1e0b8cb23a02d90a2ff670a67fda7f095f774fe170615616b712d35dd13325ade3ec31ecd9c1e7643fb4759b1db0b0ae3f89726fe2378362e6890
-
SSDEEP
6144:C7mU1aYIXB/X09QDZgK58JULqTODz8NKYQeKhwjMj22DC9OqyzcUjsyUf3mnn:C7msQRX0U58CLUAYDiwjmOyotyU+nn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2976 cmd.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Eset\Nod\CurrentVersion\Info 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2976 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 29 PID 2304 wrote to memory of 2976 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 29 PID 2304 wrote to memory of 2976 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 29 PID 2304 wrote to memory of 2976 2304 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe"1⤵
- Checks for any installed AV software in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\cmd.execmd /c c:\rmeslf.bat2⤵
- Deletes itself
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232B
MD5bf9c1e46ea65f8c2bfa0f675e577ce1e
SHA1f8b97bfa7e2bc38c0c7a4df13b7d68ec40b5c0d2
SHA256312c594125b31d684ddf793e86e8999f4d70a8df7e13abb05eafee01cc1a026a
SHA5121858b57ea5a190816707e456df4c89bf28580aadf0b7c53062866b676ba34e8d62b249a6f2140b09bdbe365259ecd08166018b15a1fbe6313dbd8a40219b9fde