Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 16:49
Static task
static1
Behavioral task
behavioral1
Sample
4a8c0d516a7936248acc6115096c0327_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4a8c0d516a7936248acc6115096c0327_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4a8c0d516a7936248acc6115096c0327_JaffaCakes118.exe
-
Size
412KB
-
MD5
4a8c0d516a7936248acc6115096c0327
-
SHA1
cc4ee08736f3d4de66e9713793602cc6fbcf802e
-
SHA256
f6594f9cb285e3d8035e6e7ee044a689e3d39b67c2a57fa3f8f23088c37d4c28
-
SHA512
053906ad5af0039da4030bd48c28a88baae8791b0cb785d33f9d67a250b25394b191aa5a930c16482f4fd698a2a471a32d01d64e9f1469f3a2d2d7c84f4a21ae
-
SSDEEP
12288:fv+nb6fSzABD2W1kSRkqIuZ/wazPUkni:fqGqz82UkSqM/rU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 456 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2644 faumcm.exe -
Loads dropped DLL 3 IoCs
pid Process 456 cmd.exe 456 cmd.exe 2644 faumcm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 1108 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2812 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1108 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe 2644 faumcm.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2368 wrote to memory of 456 2368 4a8c0d516a7936248acc6115096c0327_JaffaCakes118.exe 29 PID 2368 wrote to memory of 456 2368 4a8c0d516a7936248acc6115096c0327_JaffaCakes118.exe 29 PID 2368 wrote to memory of 456 2368 4a8c0d516a7936248acc6115096c0327_JaffaCakes118.exe 29 PID 2368 wrote to memory of 456 2368 4a8c0d516a7936248acc6115096c0327_JaffaCakes118.exe 29 PID 456 wrote to memory of 1108 456 cmd.exe 31 PID 456 wrote to memory of 1108 456 cmd.exe 31 PID 456 wrote to memory of 1108 456 cmd.exe 31 PID 456 wrote to memory of 1108 456 cmd.exe 31 PID 456 wrote to memory of 2812 456 cmd.exe 33 PID 456 wrote to memory of 2812 456 cmd.exe 33 PID 456 wrote to memory of 2812 456 cmd.exe 33 PID 456 wrote to memory of 2812 456 cmd.exe 33 PID 456 wrote to memory of 2644 456 cmd.exe 34 PID 456 wrote to memory of 2644 456 cmd.exe 34 PID 456 wrote to memory of 2644 456 cmd.exe 34 PID 456 wrote to memory of 2644 456 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a8c0d516a7936248acc6115096c0327_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4a8c0d516a7936248acc6115096c0327_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2368 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\4a8c0d516a7936248acc6115096c0327_JaffaCakes118.exe" & start C:\Users\Admin\AppData\Local\faumcm.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 23683⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:2812
-
-
C:\Users\Admin\AppData\Local\faumcm.exeC:\Users\Admin\AppData\Local\faumcm.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD54a8c0d516a7936248acc6115096c0327
SHA1cc4ee08736f3d4de66e9713793602cc6fbcf802e
SHA256f6594f9cb285e3d8035e6e7ee044a689e3d39b67c2a57fa3f8f23088c37d4c28
SHA512053906ad5af0039da4030bd48c28a88baae8791b0cb785d33f9d67a250b25394b191aa5a930c16482f4fd698a2a471a32d01d64e9f1469f3a2d2d7c84f4a21ae