Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 09:48
Static task
static1
Behavioral task
behavioral1
Sample
62bd906746e687180e6f496af2c74ba7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
62bd906746e687180e6f496af2c74ba7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
62bd906746e687180e6f496af2c74ba7_JaffaCakes118.exe
-
Size
14KB
-
MD5
62bd906746e687180e6f496af2c74ba7
-
SHA1
c612dd94178b053ea120520a936131e0afb22390
-
SHA256
4225c5b7115c7a2f8c08cbfdf8cd0a8b28952a602f13580d674762d7b551054d
-
SHA512
4d9670448f4f574d22aa3139423d71921d368b755039563f063db3e703eb68fa1f85e2ddf8d5b1b72c6a1e8fe6eb94cfa28f943a212ccef4781ca0095cf0e67a
-
SSDEEP
384:jxNR77zN0w638TNFTBs16QCzOcg9Fgt2xClr:jxN17zn66W2zONFgt2xClr
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsft = "C:\\WINDOWS\\sys32.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2720 reg.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2608 2284 62bd906746e687180e6f496af2c74ba7_JaffaCakes118.exe 31 PID 2284 wrote to memory of 2608 2284 62bd906746e687180e6f496af2c74ba7_JaffaCakes118.exe 31 PID 2284 wrote to memory of 2608 2284 62bd906746e687180e6f496af2c74ba7_JaffaCakes118.exe 31 PID 2284 wrote to memory of 2608 2284 62bd906746e687180e6f496af2c74ba7_JaffaCakes118.exe 31 PID 2608 wrote to memory of 2720 2608 cmd.exe 33 PID 2608 wrote to memory of 2720 2608 cmd.exe 33 PID 2608 wrote to memory of 2720 2608 cmd.exe 33 PID 2608 wrote to memory of 2720 2608 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\62bd906746e687180e6f496af2c74ba7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\62bd906746e687180e6f496af2c74ba7_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpfile0.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Microsft /t REG_SZ /d C:\WINDOWS\sys32.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:2720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
603B
MD5e60896801e4777d71d000ec92507ab3b
SHA1981e124730dc0f8a47cdbcc9a56af060a8d2b604
SHA256a613337197cf51b0c48863891dedbc77608bed802cbb036393be82982e598ca0
SHA5129a879e8b2cdd05581b27a9ba8cbae6eb2e5a770cc39987e2e135790ea70613f67e0f6dea27c1318e862b250eb51772ad10f8cfbb253db6fd62fe5f6275f295ee