Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
24s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/09/2024, 07:58
Static task
static1
Behavioral task
behavioral1
Sample
e45339dc5627c8df5d509861a2372e82_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e45339dc5627c8df5d509861a2372e82_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e45339dc5627c8df5d509861a2372e82_JaffaCakes118.exe
-
Size
72KB
-
MD5
e45339dc5627c8df5d509861a2372e82
-
SHA1
8c24b062cfb4029a89924080a0f91e8b71c09b2c
-
SHA256
afdc9be7e1b8b920503c44117239d1487baf68191f0ea2286b5244145224c4ce
-
SHA512
381b55e54156970724e51e54374be8998264ab56ec28bbc41b8a9f27a891fee5fa1c84c360df288e5c9d8da214aa398f4474bfa5ee73dea8f579b76929d7dba2
-
SSDEEP
1536:IY06Yg1Q3bEcdQXJyyjle6jHQzZOxEczsMb+KR0Nc8QsJq39:10734aqJtgE08bzse0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e45339dc5627c8df5d509861a2372e82_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2932 2368 e45339dc5627c8df5d509861a2372e82_JaffaCakes118.exe 29 PID 2368 wrote to memory of 2932 2368 e45339dc5627c8df5d509861a2372e82_JaffaCakes118.exe 29 PID 2368 wrote to memory of 2932 2368 e45339dc5627c8df5d509861a2372e82_JaffaCakes118.exe 29 PID 2368 wrote to memory of 2932 2368 e45339dc5627c8df5d509861a2372e82_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e45339dc5627c8df5d509861a2372e82_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e45339dc5627c8df5d509861a2372e82_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cmd.execmd2⤵
- System Location Discovery: System Language Discovery
PID:2932
-