Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
4d1f12f6a2d4983c20c1873b744ea411_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4d1f12f6a2d4983c20c1873b744ea411_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4d1f12f6a2d4983c20c1873b744ea411_JaffaCakes118.exe
-
Size
71KB
-
MD5
4d1f12f6a2d4983c20c1873b744ea411
-
SHA1
e055dbb22c3ab3b0ae96aa7a0b8dd37fdca21c91
-
SHA256
a74fb2257ec48a224b60d8d5e101812c75ce95dec424dba520156908ff44fb89
-
SHA512
ce13c338ff05922a0f3235d719e9dcb37de670305290c070dd8a55c2d59e16485b66017252346ea3ec2daa97f4c4c6294a44fe27d749beea7cc944099c679c57
-
SSDEEP
1536:lR3mvjWKkKx3qYjl7hivnToIfsIOljDQBtrrkGvXa:PjDKxtB7hcTBfiljDur5a
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2136 2560 WerFault.exe 30 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2560 1716 4d1f12f6a2d4983c20c1873b744ea411_JaffaCakes118.exe 30 PID 1716 wrote to memory of 2560 1716 4d1f12f6a2d4983c20c1873b744ea411_JaffaCakes118.exe 30 PID 1716 wrote to memory of 2560 1716 4d1f12f6a2d4983c20c1873b744ea411_JaffaCakes118.exe 30 PID 1716 wrote to memory of 2560 1716 4d1f12f6a2d4983c20c1873b744ea411_JaffaCakes118.exe 30 PID 2560 wrote to memory of 2136 2560 4d1f12f6a2d4983c20c1873b744ea411_JaffaCakes118.exe 31 PID 2560 wrote to memory of 2136 2560 4d1f12f6a2d4983c20c1873b744ea411_JaffaCakes118.exe 31 PID 2560 wrote to memory of 2136 2560 4d1f12f6a2d4983c20c1873b744ea411_JaffaCakes118.exe 31 PID 2560 wrote to memory of 2136 2560 4d1f12f6a2d4983c20c1873b744ea411_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d1f12f6a2d4983c20c1873b744ea411_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4d1f12f6a2d4983c20c1873b744ea411_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\4d1f12f6a2d4983c20c1873b744ea411_JaffaCakes118.exe11672⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 443⤵
- Program crash
PID:2136
-
-