Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
6s -
max time network
8s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
40ac8ee8f005616d31a71a583f045f98_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
40ac8ee8f005616d31a71a583f045f98_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Errors
General
-
Target
40ac8ee8f005616d31a71a583f045f98_JaffaCakes118.exe
-
Size
78KB
-
MD5
40ac8ee8f005616d31a71a583f045f98
-
SHA1
5d5268a2993b651698dc77d90c3461dfe09e2f51
-
SHA256
4350c197167001f1cc173c13c9db9a015c33e5d66a1e615a8ae97197375dcfd0
-
SHA512
e3fb1d47d0a1744c2071ea77dbba457d87a9cae7bc57bf37d3e7b4917617c2cf4b17d87808bad78fdb4c93171da4d292db2991337b05fc7f83b9998925a6ebe2
-
SSDEEP
1536:1WG/ez+XQj9+RUuv2imHFeoS62jT6ZEU1DpgmRAoKJlIK:NXW9YRuFe8qgrpRRAoKJlIK
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\lpnlkqa.dll 40ac8ee8f005616d31a71a583f045f98_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2488 40ac8ee8f005616d31a71a583f045f98_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\40ac8ee8f005616d31a71a583f045f98_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\40ac8ee8f005616d31a71a583f045f98_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2556
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2788