Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 04:26
Behavioral task
behavioral1
Sample
5f04fcbd39bf41375a777256a9be36b4_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
5f04fcbd39bf41375a777256a9be36b4_JaffaCakes118.exe
-
Size
301KB
-
MD5
5f04fcbd39bf41375a777256a9be36b4
-
SHA1
b31832d94a1ad1a419b68b2de494351dffd82cb8
-
SHA256
f666f0a9a589940ce6087f94645a1f2f811cd99febf3e0a2d132e05e99e6770d
-
SHA512
81e1175677fe9909973fd7cf350767d8f4b403d8c999731551ff9d407bf1c75b8927e661b3ffd2a03d6ae4d2b691aaf3950c64ee8f79f1eb7c3e7691590a6f19
-
SSDEEP
6144:qSBkA6sFHiMo28cApnULfnK6vaLjC8zDGI6KV8JtDM5jHE0:KsFCS6pnULfK6vijn4Mee
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x00080000000174a8-11.dat aspack_v212_v242 behavioral1/files/0x00090000000122db-23.dat aspack_v212_v242 -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5f04fcbd39bf41375a777256a9be36b4_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2720 PING.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2092 5f04fcbd39bf41375a777256a9be36b4_JaffaCakes118.exe 2092 5f04fcbd39bf41375a777256a9be36b4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2092 wrote to memory of 292 2092 5f04fcbd39bf41375a777256a9be36b4_JaffaCakes118.exe 31 PID 2092 wrote to memory of 292 2092 5f04fcbd39bf41375a777256a9be36b4_JaffaCakes118.exe 31 PID 2092 wrote to memory of 292 2092 5f04fcbd39bf41375a777256a9be36b4_JaffaCakes118.exe 31 PID 2092 wrote to memory of 292 2092 5f04fcbd39bf41375a777256a9be36b4_JaffaCakes118.exe 31 PID 2092 wrote to memory of 2140 2092 5f04fcbd39bf41375a777256a9be36b4_JaffaCakes118.exe 33 PID 2092 wrote to memory of 2140 2092 5f04fcbd39bf41375a777256a9be36b4_JaffaCakes118.exe 33 PID 2092 wrote to memory of 2140 2092 5f04fcbd39bf41375a777256a9be36b4_JaffaCakes118.exe 33 PID 2092 wrote to memory of 2140 2092 5f04fcbd39bf41375a777256a9be36b4_JaffaCakes118.exe 33 PID 2140 wrote to memory of 2720 2140 cmd.exe 35 PID 2140 wrote to memory of 2720 2140 cmd.exe 35 PID 2140 wrote to memory of 2720 2140 cmd.exe 35 PID 2140 wrote to memory of 2720 2140 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f04fcbd39bf41375a777256a9be36b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f04fcbd39bf41375a777256a9be36b4_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\qqqqqq.bat2⤵PID:292
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\aaaaaaa.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\PING.EXEping -n 4 127.0.0.13⤵
- Runs ping.exe
PID:2720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
301KB
MD584b0d8ab991ea1c9733e426d16299976
SHA19afa7c0087cfff8de7bf8f4f7a8e5558159d6e8e
SHA256b0ca3b90de3b3083da2e3eae183c65326a482d17cdc6bb9d60a64d59b5e1ae18
SHA51281505b391c3017035a712e2a4a41de4b0d9cbcb152d630672d46a9f33829ae69be6e1bde139e7b02d0198d473fbc67a71c537935583050175f38d71f1ca0ca85
-
Filesize
145B
MD50f64180de162f60d23ae8d14c6fdf0bb
SHA10eb16b7ef3efdf80ce5e823e4542515dbfcdea14
SHA2563c2192629460a97ccbe623c489b225f3cc66fa5ce2c023da575bec52ab151495
SHA512674794b74b4100d72d33a6c9171670fe21515c73f865650e8df19fe666ad8408b29ce1921d51358f888a757971fa70ef2943337257efa5c37ce39ac66324cd74
-
Filesize
272B
MD5c600ad71504c39f33cea81e314226bbe
SHA17f965b4b7080546c357aa9754eb02eae4132dc7a
SHA25624e827cce42493a9e2076b9c2ae35a799e4ad680d8c02e9f7ad31d43d26d7bc6
SHA512fbc71f022e9deb6ad20b05f998218eb228083469e784e2c20e5a97cf4a085d05147a3a30e8b97f9b61ba434f5821a52d45b11afef9d4fdab54d2ee323d517594
-
Filesize
301KB
MD55f04fcbd39bf41375a777256a9be36b4
SHA1b31832d94a1ad1a419b68b2de494351dffd82cb8
SHA256f666f0a9a589940ce6087f94645a1f2f811cd99febf3e0a2d132e05e99e6770d
SHA51281e1175677fe9909973fd7cf350767d8f4b403d8c999731551ff9d407bf1c75b8927e661b3ffd2a03d6ae4d2b691aaf3950c64ee8f79f1eb7c3e7691590a6f19
-
Filesize
196B
MD5ee2e4bb9b48be7ecfb2407ed6f63ffb1
SHA113b78b108ddaf7a815074eb54493d6c89b9be997
SHA256cf636e707f01a9eeeb586e360bfe06abb294fa7e6597fdcc888663747161de28
SHA512406d78bdfebc87bd922e3f90deefe2c61efce2aeb79585af6a991fdff395388e05c6973a395faa1541ae90d8db7f4d67847f356c793f627a6d1468dcd08136ba