Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 11:07
Static task
static1
Behavioral task
behavioral1
Sample
aefb35e0953d3b8a4d47507a58c23d1c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aefb35e0953d3b8a4d47507a58c23d1c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aefb35e0953d3b8a4d47507a58c23d1c_JaffaCakes118.exe
-
Size
124KB
-
MD5
aefb35e0953d3b8a4d47507a58c23d1c
-
SHA1
7dfcf38a99b7b116dc634d4d13661d9353ed2202
-
SHA256
8bb6ea6af92f73413c1a7c5da42edc574bb22e4be00c14daf26c04ebbfb5d35b
-
SHA512
477a6b7aaa4a3681d8a689de5614872599eb9cfafc47a1b7b4802a41819b662c18f624dc168e1a765d7afe0bdb6792a3cab404d2a29ea6202e558162c62ac80c
-
SSDEEP
1536:EQkVjEGb1BSrvnPeYJo9Vu3sQwsanTdgW/OQ/s1x3UM0+efcpsmlvm:lkVD1BSqao9c3HwsanTdgyOxsP+f+M
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2912 1940 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aefb35e0953d3b8a4d47507a58c23d1c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2912 1940 aefb35e0953d3b8a4d47507a58c23d1c_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2912 1940 aefb35e0953d3b8a4d47507a58c23d1c_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2912 1940 aefb35e0953d3b8a4d47507a58c23d1c_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2912 1940 aefb35e0953d3b8a4d47507a58c23d1c_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\aefb35e0953d3b8a4d47507a58c23d1c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aefb35e0953d3b8a4d47507a58c23d1c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 922⤵
- Program crash
PID:2912
-