Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 09:29
Static task
static1
Behavioral task
behavioral1
Sample
fc00819c4cdc8609313041cf345a7dca_JaffaCakes118.lnk
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
fc00819c4cdc8609313041cf345a7dca_JaffaCakes118.lnk
-
Size
938KB
-
MD5
fc00819c4cdc8609313041cf345a7dca
-
SHA1
3cb2d94e7a3b6d6141106e3973189e06306ce2f0
-
SHA256
83c375dcdadb8467955f5e124cf4e8d6eac78c51c03fb7393dc810a243ba1a90
-
SHA512
53b2761be2a805aa6cdc7857b70da8b25ccf0990dc1f9a6501ed73af9909db6a58667b9bcd786c9acc19309b18bc228ac02d3ebe97063b1cf6bf2362c935131c
-
SSDEEP
12288:HZ3Si/5CQsdRgvhS+u1vBcxqDE/4QiqkgLGVRivcLwOtIO1nKnYn/oGug+:53D5C5LgvMr1mx8y4dqLGnZn12Yngfg+
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2800 1984 cmd.exe 31 PID 1984 wrote to memory of 2800 1984 cmd.exe 31 PID 1984 wrote to memory of 2800 1984 cmd.exe 31 PID 2800 wrote to memory of 2868 2800 cmd.exe 32 PID 2800 wrote to memory of 2868 2800 cmd.exe 32 PID 2800 wrote to memory of 2868 2800 cmd.exe 32 PID 2800 wrote to memory of 2792 2800 cmd.exe 33 PID 2800 wrote to memory of 2792 2800 cmd.exe 33 PID 2800 wrote to memory of 2792 2800 cmd.exe 33 PID 2800 wrote to memory of 2752 2800 cmd.exe 34 PID 2800 wrote to memory of 2752 2800 cmd.exe 34 PID 2800 wrote to memory of 2752 2800 cmd.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\fc00819c4cdc8609313041cf345a7dca_JaffaCakes118.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c path=C:\Windows\system32&move "VerificationDocuments.pdf.lnk " "C:\Users\Admin\AppData\Local\Temp\1.lnk"&type "C:\Users\Admin\AppData\Local\Temp\1.lnk"|find "END2">"C:\Users\Admin\AppData\Local\Temp\0.js"&wscript "C:\Users\Admin\AppData\Local\Temp\0.js"2⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type "C:\Users\Admin\AppData\Local\Temp\1.lnk""3⤵PID:2868
-
-
C:\Windows\system32\find.exefind "END2"3⤵PID:2792
-
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\0.js"3⤵PID:2752
-
-