Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 13:24
Behavioral task
behavioral1
Sample
96474e8783adb4448bbd7b3c94da68a5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
96474e8783adb4448bbd7b3c94da68a5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
96474e8783adb4448bbd7b3c94da68a5_JaffaCakes118.exe
-
Size
91KB
-
MD5
96474e8783adb4448bbd7b3c94da68a5
-
SHA1
0efcb71354c90cc1f7c3348cbfb488881489474e
-
SHA256
939c13b55ec9c5d5a2b4b66395426085dbdb905673c93aab7e2ea9411e2bb449
-
SHA512
259ebc68512d0072c478cc8b933923d1a8890c44551ae38ca2d963519d9d02b566c2781502d483e53a927758a8560640a350f52622450f15fdb2d2e3afe5e02f
-
SSDEEP
1536:zRouNQac/kRY+4A2W4r2OecWhPeHQkv0QZ5gHYekw/L1f8QASr:iufsc47WwxelhGHQkHjUYJwzWS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 cmd.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\8ebb059e0b.dll 96474e8783adb4448bbd7b3c94da68a5_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96474e8783adb4448bbd7b3c94da68a5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2660 2460 96474e8783adb4448bbd7b3c94da68a5_JaffaCakes118.exe 33 PID 2460 wrote to memory of 2660 2460 96474e8783adb4448bbd7b3c94da68a5_JaffaCakes118.exe 33 PID 2460 wrote to memory of 2660 2460 96474e8783adb4448bbd7b3c94da68a5_JaffaCakes118.exe 33 PID 2460 wrote to memory of 2660 2460 96474e8783adb4448bbd7b3c94da68a5_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\96474e8783adb4448bbd7b3c94da68a5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96474e8783adb4448bbd7b3c94da68a5_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$30689.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181B
MD577cb93a07718f3d143d3add019da63ae
SHA1737124dda4b6eb98f02075ee6cdbb45d02dd79a6
SHA256a53d730f480f6bb1711c88336f450d2e31e546a02470a99a3ac161c7cb01589f
SHA512aeac9a541a32043ec3a48f3fc3e55d987d0a3d526c2d5997856fc56e678ae3812f12c5f3fc32f5a212351876150b18a9aa5c39f5eba970044a8bd7b45ba312a3