Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
61aa839eff990340142d1077f4e5bd45_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
61aa839eff990340142d1077f4e5bd45_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
61aa839eff990340142d1077f4e5bd45_JaffaCakes118.exe
-
Size
953KB
-
MD5
61aa839eff990340142d1077f4e5bd45
-
SHA1
b4dfa91cd0e3b740e73c501fcd8022ac721f514b
-
SHA256
cd0004e7e458180b5503735c43f121ec2e17d8b2163ac3853b4ca656ed181595
-
SHA512
b88bbd881975fa580bd54b8be7ee7d46d8bcaf89a7383f734b084b53857d9ba75084c04fdaba2ec0ed744ccf543ac88c32afa579a2b69c3339e4e25b6c85d52a
-
SSDEEP
24576:CjOHprwwhMZBThfsyYtrWmQ3+7oUVj1KuaWr:BwismGuLr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2160 testaa.exe -
Loads dropped DLL 3 IoCs
pid Process 824 61aa839eff990340142d1077f4e5bd45_JaffaCakes118.exe 824 61aa839eff990340142d1077f4e5bd45_JaffaCakes118.exe 2160 testaa.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 824 61aa839eff990340142d1077f4e5bd45_JaffaCakes118.exe 824 61aa839eff990340142d1077f4e5bd45_JaffaCakes118.exe 824 61aa839eff990340142d1077f4e5bd45_JaffaCakes118.exe 824 61aa839eff990340142d1077f4e5bd45_JaffaCakes118.exe 824 61aa839eff990340142d1077f4e5bd45_JaffaCakes118.exe 824 61aa839eff990340142d1077f4e5bd45_JaffaCakes118.exe 2160 testaa.exe 2160 testaa.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2160 testaa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 824 wrote to memory of 2160 824 61aa839eff990340142d1077f4e5bd45_JaffaCakes118.exe 31 PID 824 wrote to memory of 2160 824 61aa839eff990340142d1077f4e5bd45_JaffaCakes118.exe 31 PID 824 wrote to memory of 2160 824 61aa839eff990340142d1077f4e5bd45_JaffaCakes118.exe 31 PID 824 wrote to memory of 2160 824 61aa839eff990340142d1077f4e5bd45_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\61aa839eff990340142d1077f4e5bd45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\61aa839eff990340142d1077f4e5bd45_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\testaa.exeC:\Users\Admin\AppData\Local\testaa.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2160
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
508KB
MD5d3ad11bbfcbe28f4dc650e2b9d134103
SHA19208b004387b9124ac21f7045ecdf3f294d8df13
SHA256a5fbf2b20b02caa89a1301eacd40a4ad07c5228023aa65b08c1884fea6272d3a
SHA512a946a569a6e4ad05b27d9ca9838383e6fab55aae58fb70155f8f8c4b272a406226d623842621b10bf569eeceff20be997c85b5aa14d4c94314c920b88acf66f3
-
Filesize
237KB
MD5fdc85d7509bc6ab46a0ab204d042251e
SHA18ce59fc33e6161fafa41f18e2ab78ee6b004c1e5
SHA2560199b81ac43fc0e6db50e586ad9f852eea81902e9fc03b542c007c1ed50340a6
SHA51286579d44392c7e0d7905ee7f42580b6191e2cc48507b91efc60af08674911b142e06b752b002367af4cbab67b7c2f79a4bcb6fc1fd1fbd3d5e7faefe8a39c940