Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 08:47 UTC

General

  • Target

    d18a0b4041885cbc24d3f823ea30db1a_JaffaCakes118.exe

  • Size

    307KB

  • MD5

    d18a0b4041885cbc24d3f823ea30db1a

  • SHA1

    96cd3e5494709944b96587c2b9fdf5dbc0d57a96

  • SHA256

    e43dc1d481a2a0990a3f3f09cc4143992b95aa6ae15727956fd91f2c830e015c

  • SHA512

    5bdc7dd3f0ddb0583edd60e66c5d5bcd2f1d8bc9b6aff8c1ae541e13a66ccfdf7402bf57e9832068fbf5da9949c3ca77830bdffda0b1b8e017131a2a2a8f3a2f

  • SSDEEP

    3072:K6kQ5NO/TyYTprWuZbPTfPMZw68baFHIxCLsViYX2NCancRu3V4qqHgOJZw0i/Ye:Ps//nbr/ZoeTqU0uX

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d18a0b4041885cbc24d3f823ea30db1a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d18a0b4041885cbc24d3f823ea30db1a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Users\Admin\AppData\Local\Temp\d18a0b4041885cbc24d3f823ea30db1a_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\d18a0b4041885cbc24d3f823ea30db1a_JaffaCakes118.exe
      2⤵
        PID:2052
      • C:\Users\Admin\AppData\Local\Temp\d18a0b4041885cbc24d3f823ea30db1a_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\d18a0b4041885cbc24d3f823ea30db1a_JaffaCakes118.exe
        2⤵
          PID:3020
        • C:\Users\Admin\AppData\Local\Temp\d18a0b4041885cbc24d3f823ea30db1a_JaffaCakes118.exe
          C:\Users\Admin\AppData\Local\Temp\d18a0b4041885cbc24d3f823ea30db1a_JaffaCakes118.exe
          2⤵
            PID:2368
          • C:\Users\Admin\AppData\Local\Temp\d18a0b4041885cbc24d3f823ea30db1a_JaffaCakes118.exe
            C:\Users\Admin\AppData\Local\Temp\d18a0b4041885cbc24d3f823ea30db1a_JaffaCakes118.exe
            2⤵
              PID:2360
            • C:\Users\Admin\AppData\Local\Temp\d18a0b4041885cbc24d3f823ea30db1a_JaffaCakes118.exe
              C:\Users\Admin\AppData\Local\Temp\d18a0b4041885cbc24d3f823ea30db1a_JaffaCakes118.exe
              2⤵
                PID:2680

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2516-0-0x0000000074CA1000-0x0000000074CA2000-memory.dmp

              Filesize

              4KB

            • memory/2516-1-0x0000000074CA0000-0x000000007524B000-memory.dmp

              Filesize

              5.7MB

            • memory/2516-2-0x0000000074CA0000-0x000000007524B000-memory.dmp

              Filesize

              5.7MB

            • memory/2516-27-0x0000000074CA0000-0x000000007524B000-memory.dmp

              Filesize

              5.7MB

            • memory/3020-8-0x0000000010000000-0x000000001004D000-memory.dmp

              Filesize

              308KB

            • memory/3020-6-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/3020-5-0x0000000010000000-0x000000001004D000-memory.dmp

              Filesize

              308KB

            • memory/3020-4-0x0000000010000000-0x000000001004D000-memory.dmp

              Filesize

              308KB

            • memory/3020-3-0x0000000010000000-0x000000001004D000-memory.dmp

              Filesize

              308KB

            We care about your privacy.

            This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.