Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
67e9a242f98b89b2e9b97c6b18fa52a4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
67e9a242f98b89b2e9b97c6b18fa52a4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
67e9a242f98b89b2e9b97c6b18fa52a4_JaffaCakes118.exe
-
Size
14KB
-
MD5
67e9a242f98b89b2e9b97c6b18fa52a4
-
SHA1
a1ff53748f8519c80d12d653abfee750026910bb
-
SHA256
04ca7f4583896b615ebb662c8e7c6eb36ede6c05f836ab1457b3d0c9d10dc302
-
SHA512
f269c6f964d6119965148ffcd4464f75a05ca680dbc011b6789e479b8b939fe2600ecfebf7396cf5d6f935b125b6068d9b027414468a5d1d1d6dd3d0021fd753
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhY/Q:hDXWipuE+K3/SSHgxm/Q
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2520 DEM1362.exe 2676 DEM68F0.exe 2696 DEMBE31.exe 2380 DEM144C.exe 708 DEM694E.exe 1944 DEMBE8E.exe -
Loads dropped DLL 6 IoCs
pid Process 1820 67e9a242f98b89b2e9b97c6b18fa52a4_JaffaCakes118.exe 2520 DEM1362.exe 2676 DEM68F0.exe 2696 DEMBE31.exe 2380 DEM144C.exe 708 DEM694E.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2520 1820 67e9a242f98b89b2e9b97c6b18fa52a4_JaffaCakes118.exe 30 PID 1820 wrote to memory of 2520 1820 67e9a242f98b89b2e9b97c6b18fa52a4_JaffaCakes118.exe 30 PID 1820 wrote to memory of 2520 1820 67e9a242f98b89b2e9b97c6b18fa52a4_JaffaCakes118.exe 30 PID 1820 wrote to memory of 2520 1820 67e9a242f98b89b2e9b97c6b18fa52a4_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2676 2520 DEM1362.exe 32 PID 2520 wrote to memory of 2676 2520 DEM1362.exe 32 PID 2520 wrote to memory of 2676 2520 DEM1362.exe 32 PID 2520 wrote to memory of 2676 2520 DEM1362.exe 32 PID 2676 wrote to memory of 2696 2676 DEM68F0.exe 34 PID 2676 wrote to memory of 2696 2676 DEM68F0.exe 34 PID 2676 wrote to memory of 2696 2676 DEM68F0.exe 34 PID 2676 wrote to memory of 2696 2676 DEM68F0.exe 34 PID 2696 wrote to memory of 2380 2696 DEMBE31.exe 36 PID 2696 wrote to memory of 2380 2696 DEMBE31.exe 36 PID 2696 wrote to memory of 2380 2696 DEMBE31.exe 36 PID 2696 wrote to memory of 2380 2696 DEMBE31.exe 36 PID 2380 wrote to memory of 708 2380 DEM144C.exe 38 PID 2380 wrote to memory of 708 2380 DEM144C.exe 38 PID 2380 wrote to memory of 708 2380 DEM144C.exe 38 PID 2380 wrote to memory of 708 2380 DEM144C.exe 38 PID 708 wrote to memory of 1944 708 DEM694E.exe 40 PID 708 wrote to memory of 1944 708 DEM694E.exe 40 PID 708 wrote to memory of 1944 708 DEM694E.exe 40 PID 708 wrote to memory of 1944 708 DEM694E.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\67e9a242f98b89b2e9b97c6b18fa52a4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\67e9a242f98b89b2e9b97c6b18fa52a4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\DEM1362.exe"C:\Users\Admin\AppData\Local\Temp\DEM1362.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\DEM68F0.exe"C:\Users\Admin\AppData\Local\Temp\DEM68F0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\DEMBE31.exe"C:\Users\Admin\AppData\Local\Temp\DEMBE31.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\DEM144C.exe"C:\Users\Admin\AppData\Local\Temp\DEM144C.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\DEM694E.exe"C:\Users\Admin\AppData\Local\Temp\DEM694E.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\AppData\Local\Temp\DEMBE8E.exe"C:\Users\Admin\AppData\Local\Temp\DEMBE8E.exe"7⤵
- Executes dropped EXE
PID:1944
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD51ba955e88a1dc867dff93e3d1f48c817
SHA198e45c49eb6dc3f1aae191df6c3e98b660aae99e
SHA25612c97a8cbad32aff94a1d50717e529fb5f42b6a1deb371b9120258c1426db01e
SHA5129611f9c59acdd67549bc4ce98130aa82b9eca091b2ad824221fb5090edadc97b14a95571b4ae8e1c7e762a21d895aad8bd447e909765a878396b1b9e195162f8
-
Filesize
14KB
MD5907ff0e1628a26313dde68b3c02e93c7
SHA1f3cc5c6ab1ef6b5a7d48f3d324fe5707da7e2c5e
SHA256a8951987824ffae897dcccd5c7809fa2a284d75f15912c2fda286f214573cca6
SHA512df461dc15c19af7171a7f386412cc2f22a3cfab429a81c99ed37fff8a60cbae2175a0919aff05a7099457dfb9fe68e213d7f0a9cd92cc4c76a5028b7b4edcf93
-
Filesize
14KB
MD54ad62207f481c4e4aadb733f8c292950
SHA114c41bc8286cd587486b54536e58b7450820723e
SHA25640f47975deb693f199a727f7e1f4a9c0c00d6225c2df0a52c76f3167051cb353
SHA512e1c5bb1ff8b2494ebaca764c852094638f5140444e4a971dee1c7b1f4f11ebc1160b6a5d4fff36f99baf2295834aa51aff5ba1d3fe1b20666136abb54f0c7a45
-
Filesize
14KB
MD53c26541f8be88228629977777874d30c
SHA1764802c51a558119c0e35dd0e7327e632cfe59c9
SHA256230a41f2aadb86560466fa844837963db4b35d15ec8f434ce2b3ef16e4956633
SHA5120acb9198732b73178fbd33413fa63ea590041698e532cbf37d05f6bee766967d4606fe900167d085a74b75a008ba3ca58b55ad1c10e2c0e6a916039e624b1b14
-
Filesize
14KB
MD5149e37b3e844b370af39e795a106dc52
SHA1a53d97e2d07c08c7e04b7528875065447f606222
SHA25659acd5e8cd2ee07d8404ee1190b92c7d1264785faa0446504eabb172213c08e3
SHA5125e097c623f1c4ddeae0dec35c8f8e0d67e967118715a6bfd509550e886a01df0ac68b5b72f21753544925b1019b6c8a561812088d484385ef0403e24d640c957
-
Filesize
14KB
MD5abd5f80350fc67daa5d7aa72957a5dc1
SHA15ea13b8268d839d38f987c85e0281e1ddba59406
SHA2562821c442af554c25dcf7332440c2bbc03b06d44fd0c2c134dc3a63c7f1c49162
SHA512c52be91a6dc0dfe94d85e2d12e5638151804622dcba3c776e58a175bd11935d9028c140e92b9452a5a42cea2335a09bfb5323eb4a23b12d57fd844a955e11521