Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 13:30

General

  • Target

    78546b7212d02ac765fb8cba111a368e_JaffaCakes118.exe

  • Size

    76KB

  • MD5

    78546b7212d02ac765fb8cba111a368e

  • SHA1

    586632d41521d057c01cd661b32c42c1e875254d

  • SHA256

    ba096b1498e1f3e7bb7c00ee289f20fa6fbc14159ec461c976cb1984f7c70818

  • SHA512

    f6b01bbb1f60b1e2c521e6e24a49342a9d9ffe76defd11b32e23fd64b757db744b8a62023758be4493f7f5d36fa15b9d74e857aba164b37f5f335abc7b6dc669

  • SSDEEP

    1536:GV0W3v82yt2tDxw9/KTPjwGFaZHUQOg9f/T2XyFB:GWW3BytKNKK/wTZHUQOyf72s

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78546b7212d02ac765fb8cba111a368e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\78546b7212d02ac765fb8cba111a368e_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2216-6-0x00000000000C0000-0x00000000000C9000-memory.dmp

    Filesize

    36KB

  • memory/2216-4-0x00000000000C0000-0x00000000000C9000-memory.dmp

    Filesize

    36KB

  • memory/2216-3-0x00000000000C0000-0x00000000000C9000-memory.dmp

    Filesize

    36KB

  • memory/2216-9-0x00000000000C0000-0x00000000000C9000-memory.dmp

    Filesize

    36KB

  • memory/2740-1-0x00000000003A0000-0x00000000003A2000-memory.dmp

    Filesize

    8KB

  • memory/2740-5-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2740-2-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2740-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB