Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
973d317e15bf777ed292a4a92940c15b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
973d317e15bf777ed292a4a92940c15b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
973d317e15bf777ed292a4a92940c15b_JaffaCakes118.exe
-
Size
167KB
-
MD5
973d317e15bf777ed292a4a92940c15b
-
SHA1
3119687439d182bf0ffeeebbd5380afd25949cfa
-
SHA256
37dc5ec2066a1f38da2a1c0d35c00b6ecbff72188ee39f63f09c81a79336b29f
-
SHA512
bf6613df4e4c0f6012297eb0d87863f98a4688b6509d558471d9485a08f14b2ac92e79f359f256ff2983653cc5fe5c92e87c9f3b4c90898d8ece57f947280069
-
SSDEEP
3072:VuuZDRlcRky36UIsOL73BIWkdtpc2V9Unnfcfxd85iBHMykm7BpN1h:VuutcRk0FOL7x7kdtmEi0fT8gdF7BLn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 973d317e15bf777ed292a4a92940c15b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wordpad.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2828 wordpad.exe 2828 wordpad.exe 2828 wordpad.exe 2828 wordpad.exe 2828 wordpad.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 560 wrote to memory of 2828 560 973d317e15bf777ed292a4a92940c15b_JaffaCakes118.exe 29 PID 560 wrote to memory of 2828 560 973d317e15bf777ed292a4a92940c15b_JaffaCakes118.exe 29 PID 560 wrote to memory of 2828 560 973d317e15bf777ed292a4a92940c15b_JaffaCakes118.exe 29 PID 560 wrote to memory of 2828 560 973d317e15bf777ed292a4a92940c15b_JaffaCakes118.exe 29 PID 2828 wrote to memory of 480 2828 wordpad.exe 30 PID 2828 wrote to memory of 480 2828 wordpad.exe 30 PID 2828 wrote to memory of 480 2828 wordpad.exe 30 PID 2828 wrote to memory of 480 2828 wordpad.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\973d317e15bf777ed292a4a92940c15b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\973d317e15bf777ed292a4a92940c15b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:480
-
-