Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe
-
Size
234KB
-
MD5
4b1e030ced797e33c56a3eb66bcd365c
-
SHA1
e7781f19dd85cac349463c8b7f2328cab107af3e
-
SHA256
04efbfa8971fd9b3682455a44ddf839bbf9dccbdcc68af4edb4fb31606dc62e3
-
SHA512
a4f2502258d661859f5165b81c92bf79b53b113a71ea5fc5d02f8003818fe94fb1efc3cc80b6659960bd5902fa68cc4c9b54cf206caa0defaaf4268bd3c29845
-
SSDEEP
6144:ikzVUWREccnt1szMG2MqmmIdBF9Pvj0Ps7Qm2Xy2NI:ikeCEccjswGAyPvj0YQZXNI
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0007000000016cc3-15.dat acprotect -
Executes dropped EXE 3 IoCs
pid Process 2680 service.exe 2792 service.exe 2968 service.exe -
Loads dropped DLL 9 IoCs
pid Process 1048 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe 1048 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe 2680 service.exe 1048 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe 1048 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe 2792 service.exe 1048 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe 1048 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe 2968 service.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\service.exe 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\AdmDll.dll 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2680 1048 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe 31 PID 1048 wrote to memory of 2680 1048 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe 31 PID 1048 wrote to memory of 2680 1048 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe 31 PID 1048 wrote to memory of 2680 1048 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe 31 PID 1048 wrote to memory of 2792 1048 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe 32 PID 1048 wrote to memory of 2792 1048 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe 32 PID 1048 wrote to memory of 2792 1048 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe 32 PID 1048 wrote to memory of 2792 1048 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe 32 PID 1048 wrote to memory of 2968 1048 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe 33 PID 1048 wrote to memory of 2968 1048 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe 33 PID 1048 wrote to memory of 2968 1048 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe 33 PID 1048 wrote to memory of 2968 1048 4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b1e030ced797e33c56a3eb66bcd365c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\service.exeservice.exe /install /silence2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2680
-
-
C:\Windows\SysWOW64\service.exeservice.exe /pass:SXX13CVV2 /port:4899 /save /silence2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2792
-
-
C:\Windows\SysWOW64\service.exeservice.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2968
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD59e0c7ccdf0a3872293c37929062b68da
SHA161b0538ef9d5353f055e0dfc222170921e82b151
SHA256c5a2b46afe762eb33539a752ea80b43c83c739ee1ea0ed3f8eecd4b65f777ff9
SHA512665db77ea69f6dce3939536edca8fea02aaf1c041a38fc7cecf1c203063b5ea34db1b6763f383d1aa6c795279687f7e35b85a793e047dc06d157bd70b8d2b189
-
Filesize
180KB
MD580b71dba8fbbfb503fa79922e93350af
SHA18db1431e1fe06a014be4445b24cbf4ac70a6ef89
SHA25630ddc3604aab61905b5fd363ebc3a33cf2a4bb515663add5c373b8997958e47c
SHA512fad23e8fff3bb73625d9b0945160a09d6a31ec2c207e29110ff2c5156a8105fd1fc4c6c86ec960465767b237cdac2b935b2be90d00d14a57880e29d6fd24e2a3