Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 23:50 UTC

General

  • Target

    b98dcd9ed7f341135449e28cf791e996_JaffaCakes118.exe

  • Size

    224KB

  • MD5

    b98dcd9ed7f341135449e28cf791e996

  • SHA1

    ffb13f9981d7440ce196269e3aa4160cf32e4652

  • SHA256

    87b22ad797c6f14f43054dff95a5517bb2a7bfbd08aec17d89d0c259fde3017f

  • SHA512

    ee5af10da07a469b19dcee3426ce9399dcd4c23376487791560d37e897a783276134b9565c90900e95cae10d7a713a64a32feced403ddd00486e233acf034cb4

  • SSDEEP

    3072:+I52Ocrxs3Zxghq+P/RRlTmNtUxI9x2EMVaE3r9T3n1HcyGTuMiQKQ:+I6xsXSnZW+x22EMVlRjuAMnKQ

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b98dcd9ed7f341135449e28cf791e996_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b98dcd9ed7f341135449e28cf791e996_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 124
      2⤵
      • Program crash
      PID:2020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2852-1-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2852-0-0x0000000000401000-0x0000000000403000-memory.dmp

    Filesize

    8KB

  • memory/2852-2-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2852-3-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2852-4-0x0000000000401000-0x0000000000403000-memory.dmp

    Filesize

    8KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.