Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 09:27 UTC

General

  • Target

    411c63191521150aca68246455150154_JaffaCakes118.exe

  • Size

    196KB

  • MD5

    411c63191521150aca68246455150154

  • SHA1

    4b241afb4931fa00033444aea3ccac906e932f25

  • SHA256

    20e81ff4f1cc1819ee722b6454e0e9b8abf90b5802ca70a1a598bbb706dc2239

  • SHA512

    0149564c3a759bf4fe2515359912886e10c7568c248d614487baf828d88a2aa3a25d06855bf6dc08c3216998a03b7f3faa4f0f0d3a9eb3d1a0d2cf8ecf91f131

  • SSDEEP

    3072:rxGp+5NXpMQzj6WJ5LQLgS0yagRF+ghEtSd9NOGW1z4c8eQjsUNyDHFy6jp5:FGp+nGQzj6WJikBT0FxhII9BXgUNy/X

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\411c63191521150aca68246455150154_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\411c63191521150aca68246455150154_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\AppData\Local\Temp\411c63191521150aca68246455150154_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\411c63191521150aca68246455150154_JaffaCakes118.exe
      2⤵
        PID:2204

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2204-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2204-3-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/2204-11-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/2204-15-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/2204-9-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/2204-7-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/2204-5-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/2204-19-0x0000000000401000-0x000000000041E000-memory.dmp

      Filesize

      116KB

    • memory/2204-17-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/2232-2-0x0000000074340000-0x00000000748EB000-memory.dmp

      Filesize

      5.7MB

    • memory/2232-1-0x0000000074340000-0x00000000748EB000-memory.dmp

      Filesize

      5.7MB

    • memory/2232-0-0x0000000074341000-0x0000000074342000-memory.dmp

      Filesize

      4KB

    • memory/2232-18-0x0000000074340000-0x00000000748EB000-memory.dmp

      Filesize

      5.7MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.