Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 18:28
Behavioral task
behavioral1
Sample
644c1885147e1256d8a89e8c1ad2cece_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
644c1885147e1256d8a89e8c1ad2cece_JaffaCakes118.exe
-
Size
784KB
-
MD5
644c1885147e1256d8a89e8c1ad2cece
-
SHA1
4e1fd57489ff6450b48a62eeca4105a2ba3b54c0
-
SHA256
3f575b0159ea38c685b598273409ff1ed049aaf37b9999fda138d592419116f6
-
SHA512
f42c7a8cf3a79b46c0bb3300d630510337c34fefb4c945aed8bd8b8c5bb49c610bf8c1fbb46cf0990d636d1396040effa9876d4913600438cf57d6d36a4ea5df
-
SSDEEP
24576:Pxgm8KKArlk/TtUy8mXy3qzqeUyzKcE/q:Gm88KCmXZWeQ/q
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/1872-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1872-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2304-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2304-30-0x00000000030B0000-0x0000000003243000-memory.dmp xmrig behavioral1/memory/2304-23-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2304-33-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/2304-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2304 644c1885147e1256d8a89e8c1ad2cece_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2304 644c1885147e1256d8a89e8c1ad2cece_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1872 644c1885147e1256d8a89e8c1ad2cece_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1872-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000900000001202f-15.dat upx behavioral1/memory/2304-16-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1872 644c1885147e1256d8a89e8c1ad2cece_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1872 644c1885147e1256d8a89e8c1ad2cece_JaffaCakes118.exe 2304 644c1885147e1256d8a89e8c1ad2cece_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2304 1872 644c1885147e1256d8a89e8c1ad2cece_JaffaCakes118.exe 31 PID 1872 wrote to memory of 2304 1872 644c1885147e1256d8a89e8c1ad2cece_JaffaCakes118.exe 31 PID 1872 wrote to memory of 2304 1872 644c1885147e1256d8a89e8c1ad2cece_JaffaCakes118.exe 31 PID 1872 wrote to memory of 2304 1872 644c1885147e1256d8a89e8c1ad2cece_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\644c1885147e1256d8a89e8c1ad2cece_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\644c1885147e1256d8a89e8c1ad2cece_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\644c1885147e1256d8a89e8c1ad2cece_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\644c1885147e1256d8a89e8c1ad2cece_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2304
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD58e972741239eddd783a889df9a061654
SHA1700583a83fd02ebfd8f59e8fb3e489004cffb966
SHA25654820e5cba001390c1bfe7b214c6ff9976b0e65c35762cafb906ac4ee0d83ace
SHA512c99371ed161178c31c918ad63e8af30335059408957b68e5c597b969fb887758e1d633a04b790641dfeff01f69395780082eaae6d3d3cc052a8e61b6d2d70f08