Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 09:46
Behavioral task
behavioral1
Sample
c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe
-
Size
379KB
-
MD5
c89641a271083eb1d8afdbe6d042e08a
-
SHA1
ea8e36b3b2d7ea64b9b7263b95e8916fa838a4c0
-
SHA256
c307c7df671d9f00d2845ea6ed47236f3cf622b91ba9aeb3d0da4f7bbbe0263a
-
SHA512
f1bdb1c0b325b38e4d3c935513e992fd3aa59881424791f3db58462bd4db53b2970175d4377954e996409d9a67d4b7fedf0868e7f1d2e614b578aeae8d04cee8
-
SSDEEP
6144:OuJKq3G5Li4VSaIHVhfo6YiBshMPWsAMy6WqzK2ZXmcZ4nnN3TnPHT+g2aBCQZ5x:OuveLlVhGhwwBU+Wsg6WqZZXmcZi3TPn
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2480-0-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2480-22-0x0000000000400000-0x0000000000492000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2480-22-0x0000000000400000-0x0000000000492000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 11 IoCs
pid Process 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 2480 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a8063bd37d3c8fb3176a6bf140558a4d
SHA1e32cf4b407db3d3773ded13ff64b70fdbad7735f
SHA256bccb23d41c2cc69cf0c7d22c4314ca8181a513c6999b73e45307792830f4e482
SHA51282d749f6b17b21587fb345ca196a2aa83eca80ad66ed9c1ab88b36709bed14175d53afefe9acc0dafc4fad78ffb8df155193a6829bc857ad6d68b1c84af7b854