Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 17:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe
Resource
win7-20240708-en
5 signatures
150 seconds
General
-
Target
abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe
-
Size
228KB
-
MD5
abeae897d3ec165f481377d451dba0cb
-
SHA1
28e9765c41870bd6669ff7c22f5d8c1de7d2f1c9
-
SHA256
ea59ee42e3fc30b26db9e6bdecac3372948a07ff067325df0a50f88fbf658192
-
SHA512
45eed0b879e2dbc9ed34f07856ead27b4734c73abd57d0b78e16ea3e88b628547e86c1ed54e0902950011143a0162b3ec21f54b11117c6d3bb4dcea14aa0f2f6
-
SSDEEP
6144:wt9d/LWPEz2gof2dgHga9eUN5WA7icAvFvGwh:mZLWPDjf2dgAaUUN5R7AF
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2080 set thread context of 2208 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe -
Suspicious use of SetWindowsHookAW 24 IoCs
pid Process 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2208 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 30 PID 2080 wrote to memory of 2208 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 30 PID 2080 wrote to memory of 2208 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 30 PID 2080 wrote to memory of 2208 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 30 PID 2080 wrote to memory of 2208 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 30 PID 2080 wrote to memory of 2208 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 30 PID 2080 wrote to memory of 2208 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 30 PID 2080 wrote to memory of 2208 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 30 PID 2080 wrote to memory of 2208 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 30 PID 2080 wrote to memory of 2208 2080 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 30 PID 2208 wrote to memory of 1192 2208 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 21 PID 2208 wrote to memory of 1192 2208 abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe"2⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookAW
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\abeae897d3ec165f481377d451dba0cb_JaffaCakes118.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2208
-
-