Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 15:38
Behavioral task
behavioral1
Sample
96b1403352ab992bf7ddeca51459f77c_JaffaCakes118.exe
Resource
win7-20240708-en
4 signatures
150 seconds
General
-
Target
96b1403352ab992bf7ddeca51459f77c_JaffaCakes118.exe
-
Size
105KB
-
MD5
96b1403352ab992bf7ddeca51459f77c
-
SHA1
08ab514103599142b87a12279aeaf1baa0c8b9ba
-
SHA256
4ebbb5b029f65f1a54fc6c5f70f36e98c57df8fd6b40f3df15359789f70598a4
-
SHA512
02904c21d7c0e0b8663ac37ab0bf916ec3cd35d9485f03a254f01cdff4c886cc8205fc92dc13d90474d5d68ccc973cfddac489ceed728a63482698e1795c50e3
-
SSDEEP
3072:5fgsJ1wbvHtJQfhyK8603IbnlzGvDKycLEMJU:9gsJWHCIKy3IblzGvDKnb
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2652-0-0x0000000000400000-0x000000000044B000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2652 96b1403352ab992bf7ddeca51459f77c_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2652 96b1403352ab992bf7ddeca51459f77c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2652 wrote to memory of 1200 2652 96b1403352ab992bf7ddeca51459f77c_JaffaCakes118.exe 21 PID 2652 wrote to memory of 1200 2652 96b1403352ab992bf7ddeca51459f77c_JaffaCakes118.exe 21 PID 2652 wrote to memory of 1200 2652 96b1403352ab992bf7ddeca51459f77c_JaffaCakes118.exe 21 PID 2652 wrote to memory of 1200 2652 96b1403352ab992bf7ddeca51459f77c_JaffaCakes118.exe 21 PID 2652 wrote to memory of 1200 2652 96b1403352ab992bf7ddeca51459f77c_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\96b1403352ab992bf7ddeca51459f77c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96b1403352ab992bf7ddeca51459f77c_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2652
-