Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 17:18
Static task
static1
Behavioral task
behavioral1
Sample
429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe
-
Size
23KB
-
MD5
429f15cc348a4fde9efe7674918ad905
-
SHA1
a055bb652059fb58b8193033c4ad228ddd628a5d
-
SHA256
8c15547bfca61fdb10749f239d8f4c9956054983bbf85ef83ff9750227441ba5
-
SHA512
e8be894e23031196607af725f338dac195e44c3c4ed38afe768c69b35c124b2d8f04a0cd784752e2ab375fdb8ab7e794f026b88f8703ce056a7940f5bc068998
-
SSDEEP
384:uZiZ7ntrXGOuy6bkNIgeAo1Go0NQECpPQVFvA4FfqCQOsAWI4zuXJ6m1XVlt1:AYrXxi3x1Go+z0QzrJRQRAWIquXI4H
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2752 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2836 PING.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1940 429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2752 1940 429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe 32 PID 1940 wrote to memory of 2752 1940 429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe 32 PID 1940 wrote to memory of 2752 1940 429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe 32 PID 1940 wrote to memory of 2752 1940 429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe 32 PID 2752 wrote to memory of 2836 2752 cmd.exe 34 PID 2752 wrote to memory of 2836 2752 cmd.exe 34 PID 2752 wrote to memory of 2836 2752 cmd.exe 34 PID 2752 wrote to memory of 2836 2752 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\cmd.execmd.exe /c echo ping 127.1 -n 3 >nul 2>nul >c:\2.bat&echo del "C:\Users\Admin\AppData\Local\Temp\429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe">>c:\2.bat&echo del c:\2.bat>>c:\2.bat&c:\2.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\PING.EXEping 127.1 -n 33⤵
- Runs ping.exe
PID:2836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124B
MD5e5a7ffe249a66b1af2d80fdc25856377
SHA1ea23e2d7c3d84394ec35e5b34a425925dbe732fb
SHA25606c562b3e423398118c55dfeb7d23ed0b31d5d97ec04592830b7a1161752f972
SHA5128cbd95fa5d00f27d38af333664aaa3d9ac26438b0a52178a9994eaa7e1ce7a71781339cc55c9a0ce3ffd20e4e4a29a338f4b902aa76e4166540ef7e2188086c7