Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
8ee244ad6b6f2b814d34d26dae880f12
-
SHA1
5988431f4a18ae89ce22d540b2872c3b349a3eba
-
SHA256
c8e432a8271910e909e3b6dce20ad368fa02a8c76d7abc9e9452c0d9227f6129
-
SHA512
b308229665359a5b5328706c927c3ce3a670a21f2d71f4fdedaead1028424ac53ec3e2edacd3aa942080877b66251ee631d328eb334dddfb90ce8cdb9a6223ec
-
SSDEEP
49152:aXUWJPtNZIN7F4R0NKISULOvjwwx6ts8F1ba3qVg0iMupcXreomUla8WfEtzgSs/:apA4UKZXvjwwxb8F1ba3sg0ryZUlalfB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1540 Center259489395.dat -
Loads dropped DLL 2 IoCs
pid Process 1052 8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe 1052 8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1052 8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe 1052 8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1052 wrote to memory of 1540 1052 8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe 30 PID 1052 wrote to memory of 1540 1052 8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe 30 PID 1052 wrote to memory of 1540 1052 8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe 30 PID 1052 wrote to memory of 1540 1052 8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\Center259489395.dat"C:\Users\Admin\AppData\Local\Temp\Center259489395.dat"2⤵
- Executes dropped EXE
PID:1540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD55d04457e3d4026a82ac3ec9b1c0819ec
SHA1f7d9a0e3f08239ca5113c5e109f5b602b4c97db3
SHA2564778938b911bec8ad1a9059b79ac0cc6bafddee2389c4c2b9297d47ecb8c2215
SHA512a97bf4e99cb1626c75b9752093feb053eba2b4fa36aed2920f16194627056f74e9fff517aa139d9c74e1de9b9c3df88118591d174e021552e010fba860f72f12