Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 01:24
Behavioral task
behavioral1
Sample
df3dca9ac91118147099a962771a6e78_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
df3dca9ac91118147099a962771a6e78_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
df3dca9ac91118147099a962771a6e78_JaffaCakes118.exe
-
Size
32KB
-
MD5
df3dca9ac91118147099a962771a6e78
-
SHA1
ea83ef4136948d13c170ab6dc731b745d86f954b
-
SHA256
5e71e33ad79615b1539f470336c3742cf8046629cf2797481b1b301bdc3b152e
-
SHA512
e18cf0e483f42545b444b98d8b75fe75214337359bbe431beea3c4172c7843f4f45313399325324352d164495baa083f0ec7287503532c1f6102bcda0b56c938
-
SSDEEP
384:k1GVhNN6ISrC4CFHzmjT7t2hIsr9qN7MbnHcGd4PTiUz7:k1dDMzCTerVciKiUz7
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2136 df3dca9ac91118147099a962771a6e78_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2340 2136 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df3dca9ac91118147099a962771a6e78_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2340 2136 df3dca9ac91118147099a962771a6e78_JaffaCakes118.exe 30 PID 2136 wrote to memory of 2340 2136 df3dca9ac91118147099a962771a6e78_JaffaCakes118.exe 30 PID 2136 wrote to memory of 2340 2136 df3dca9ac91118147099a962771a6e78_JaffaCakes118.exe 30 PID 2136 wrote to memory of 2340 2136 df3dca9ac91118147099a962771a6e78_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\df3dca9ac91118147099a962771a6e78_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df3dca9ac91118147099a962771a6e78_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 922⤵
- Program crash
PID:2340
-