Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe
-
Size
488KB
-
MD5
4115f8fe83b1f662a8138288af819f8c
-
SHA1
aed5c4ab1e634d280eb48b2a7b33d2f3b01f57db
-
SHA256
75b0dbe4589c8bf07703ef43aba01533a1f32333f81f57eb79b8af8f14e2dfaa
-
SHA512
635a1752012eb9034bcb3f52c142f3afb6d12c12a101b57294547ff854d7b347c91ea96ed4063551ab1b6d95cb281ad993a256acfa03b0c270ed57441b19f5d2
-
SSDEEP
12288:aoL9QX0wZg6haFqZRltuSdSmQb6sAQVzgbRDTRIPS:aA40wZhaFqDltuS7QWWV8bRvT
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2504 set thread context of 3052 2504 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 30 -
NTFS ADS 3 IoCs
description ioc Process File created C:\ProgramData:$SS_DESCRIPTOR_SBXNV9VVGV1BFNV4MH105LBYLVN60RGBXV2WJMPFSVF7JBCVP4GF 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe File created C:\ProgramData\DYA_FCBTKNFJPLEWOJKMO\1.0.0:$SS_DESCRIPTOR_SBXNV9VVGV1BFNV4MH105LBYLVN60RGBXV2WJMPFSVF7JBCVP4GF 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe File created C:\Users\Public\Desktop:$SS_DESCRIPTOR_SBXNV9VVGV1BFNV4MH105LBYLVN60RGBXV2WJMPFSVF7JBCVP4GF 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2504 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 2504 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 2504 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 2504 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 2504 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 2504 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 2504 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 2504 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 3052 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 3052 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2504 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2504 wrote to memory of 3052 2504 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 30 PID 2504 wrote to memory of 3052 2504 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 30 PID 2504 wrote to memory of 3052 2504 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 30 PID 2504 wrote to memory of 3052 2504 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 30 PID 2504 wrote to memory of 3052 2504 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 30 PID 2504 wrote to memory of 3052 2504 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 30 PID 2504 wrote to memory of 3052 2504 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 30 PID 2504 wrote to memory of 3052 2504 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 30 PID 3052 wrote to memory of 1172 3052 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 21 PID 3052 wrote to memory of 1172 3052 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 21 PID 3052 wrote to memory of 1172 3052 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 21 PID 3052 wrote to memory of 1172 3052 4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4115f8fe83b1f662a8138288af819f8c_JaffaCakes118.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3052
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
971B
MD57b42699a54ba884ac48243f69a125fd6
SHA129efd8b2daefb35e81cf78621379475d0ce8c9b7
SHA2568cd572118953334da58fe6959222338d88e0d704c2a46df6e1261cea6db3c68e
SHA512cc127add9079412fddc609313afca3f231fda5bc167065945b1cf71c03a8ceaab990a371cd6875a2eeb45a26905a2f5ae91be2b949198fa0555393c0d02411fc
-
Filesize
971B
MD55d74eb78dff529498a72176e364fbb6d
SHA1bd7f310ec0950867fb2f4ef36bbe10adc7e1202c
SHA2561edc485318f11c444909c3dbc2ce7f2d1b0472c4b8f458ff18fbe408529dc48f
SHA51273c666d4c8564e35bde0bb3e84c430e73dc8f1e710f2bd82039632f80cc5903233bc5dd02718422f7b5d3803f9453fc5ccb66e0ccfb41fbfb8a8c06f208f9aa2
-
Filesize
971B
MD5158a7ec171bc7797e0a4729beb2f35dd
SHA1f0d89397806724d1cf91761aa930ebbeac8f0de7
SHA2565e3b043276106da47c9f4d5f56754e991d3916ca5de3b1c669de280c8fb9cd56
SHA5120791be40bdd8f9bba68a176fc026a2d389792ae2a5ebbc13a79beebdf41997cf6c59b4775337e9d395e5e4ac664469d7206e06213686787d833b51b1f8bc1b4c