Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 05:55 UTC

General

  • Target

    eab5d9c506166f34b51d41e701b95481_JaffaCakes118.exe

  • Size

    231KB

  • MD5

    eab5d9c506166f34b51d41e701b95481

  • SHA1

    487953c791b45f7b788cb11e74ec80f7ca47bf63

  • SHA256

    29e955e322990b62dcad4fb4dbaf904431c0f1555447e90e44ba72e52c961449

  • SHA512

    85619c5fb53c58153e3428ceef9360bbd9c889dce2e0450c1ee765ab827f29c0590e72f5ba8cae0ae545d8c70754ef49f7f83baa0110f019797fff0b7d48b5f0

  • SSDEEP

    6144:pJAHPCv8EEKcZA2TM46Phd/7AYHRxxDpXXE:HAvCEMcp437AYHRxxDpXXE

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eab5d9c506166f34b51d41e701b95481_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eab5d9c506166f34b51d41e701b95481_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2988-0-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2988-2-0x0000000000260000-0x0000000000299000-memory.dmp

    Filesize

    228KB

  • memory/2988-1-0x0000000000220000-0x0000000000224000-memory.dmp

    Filesize

    16KB

  • memory/2988-3-0x0000000002010000-0x0000000002020000-memory.dmp

    Filesize

    64KB

  • memory/2988-10-0x0000000000430000-0x0000000000431000-memory.dmp

    Filesize

    4KB

  • memory/2988-9-0x0000000077481000-0x0000000077482000-memory.dmp

    Filesize

    4KB

  • memory/2988-8-0x0000000001E20000-0x0000000001F20000-memory.dmp

    Filesize

    1024KB

  • memory/2988-7-0x0000000001E00000-0x0000000001E10000-memory.dmp

    Filesize

    64KB

  • memory/2988-6-0x000000007747F000-0x0000000077480000-memory.dmp

    Filesize

    4KB

  • memory/2988-5-0x0000000077480000-0x0000000077481000-memory.dmp

    Filesize

    4KB

  • memory/2988-4-0x0000000001E10000-0x0000000001E20000-memory.dmp

    Filesize

    64KB

  • memory/2988-13-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2988-14-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2988-15-0x0000000000260000-0x0000000000299000-memory.dmp

    Filesize

    228KB

  • memory/2988-16-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.