Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 01:06
Behavioral task
behavioral1
Sample
8cb6b1722bbd7b5168ff0899e0562a07_JaffaCakes118.exe
Resource
win7-20240704-en
4 signatures
150 seconds
General
-
Target
8cb6b1722bbd7b5168ff0899e0562a07_JaffaCakes118.exe
-
Size
728KB
-
MD5
8cb6b1722bbd7b5168ff0899e0562a07
-
SHA1
bdc8ec281e8d887136c4df78f1e9c0a442b3f6dc
-
SHA256
819664bc5d3affff630ba212952d9d22fe101dac42616d316b481e4ad2d97921
-
SHA512
e26e9076edc61bc4c06f0b3aabf65996f939c95a5069c690b978f204adf13ad21e34161e3109ce52bc9ce471ed6afa80658355d02de8e3bea609106bc8764bc8
-
SSDEEP
12288:YLb58E2pBHGpQiKpBIuZNNiFsLXOL+ikJvRg597+QKUvrISVwNTL:yeJpBniKpBPzkbkJ59aISw
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2068-0-0x0000000000400000-0x00000000004EF000-memory.dmp upx behavioral1/memory/2068-2-0x0000000000400000-0x00000000004EF000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3000 2068 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8cb6b1722bbd7b5168ff0899e0562a07_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2068 wrote to memory of 3000 2068 8cb6b1722bbd7b5168ff0899e0562a07_JaffaCakes118.exe 30 PID 2068 wrote to memory of 3000 2068 8cb6b1722bbd7b5168ff0899e0562a07_JaffaCakes118.exe 30 PID 2068 wrote to memory of 3000 2068 8cb6b1722bbd7b5168ff0899e0562a07_JaffaCakes118.exe 30 PID 2068 wrote to memory of 3000 2068 8cb6b1722bbd7b5168ff0899e0562a07_JaffaCakes118.exe 30 PID 2068 wrote to memory of 3000 2068 8cb6b1722bbd7b5168ff0899e0562a07_JaffaCakes118.exe 30 PID 2068 wrote to memory of 3000 2068 8cb6b1722bbd7b5168ff0899e0562a07_JaffaCakes118.exe 30 PID 2068 wrote to memory of 3000 2068 8cb6b1722bbd7b5168ff0899e0562a07_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cb6b1722bbd7b5168ff0899e0562a07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8cb6b1722bbd7b5168ff0899e0562a07_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 2522⤵
- Program crash
PID:3000
-