Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
113s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
fd390fcda3805e0ff1ed644a38ba338e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd390fcda3805e0ff1ed644a38ba338e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fd390fcda3805e0ff1ed644a38ba338e_JaffaCakes118.exe
-
Size
94KB
-
MD5
fd390fcda3805e0ff1ed644a38ba338e
-
SHA1
1a061ed4f1ae7416a98b96c4d743318b66c0925b
-
SHA256
d01b49c7fcd8c04863bc5c1bc9974a02e9d106c5cea056cde63d5f5979bb6716
-
SHA512
4461e53ceb89e0b8765fe50e08b18e725a3b317782ec6d112f2de34e0bb9ab63f9bb9aa6923eff3ff2b2a73e415265ece61630c67da1aee80c771244657c3220
-
SSDEEP
1536:S9zUbCZ2aAEvzDW4K9lL4Sr+zLdGup3EiJ3RPJw4cDYyTE4xwJlg8x8z:S9zAErxKnuAup043RbVlg8x8z
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2564 2328 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd390fcda3805e0ff1ed644a38ba338e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2564 2328 fd390fcda3805e0ff1ed644a38ba338e_JaffaCakes118.exe 29 PID 2328 wrote to memory of 2564 2328 fd390fcda3805e0ff1ed644a38ba338e_JaffaCakes118.exe 29 PID 2328 wrote to memory of 2564 2328 fd390fcda3805e0ff1ed644a38ba338e_JaffaCakes118.exe 29 PID 2328 wrote to memory of 2564 2328 fd390fcda3805e0ff1ed644a38ba338e_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd390fcda3805e0ff1ed644a38ba338e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd390fcda3805e0ff1ed644a38ba338e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2328 -s 1362⤵
- Program crash
PID:2564
-