Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
00396e4da96a97766313a548570b5d35_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00396e4da96a97766313a548570b5d35_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
00396e4da96a97766313a548570b5d35_JaffaCakes118.exe
-
Size
91KB
-
MD5
00396e4da96a97766313a548570b5d35
-
SHA1
a04ca242e2cf71dee431ccd809e943404a5a1e1a
-
SHA256
274788c12871c80676d9f04190bfc3f551952dbe8f32fb7459dff1138fdcecad
-
SHA512
97eec73a60fdbfd5075f615c1a3e22745712a3d1a8394ea0aa774c7525ab2f70a813633f2e5c2976390fd0eb67690655eb66ff6546295fecbbdd2313e9a82a90
-
SSDEEP
1536:BpzdwtSeLldxi4DV3KkYgurpMg1rfzH1fI/Y4OPzb4r9Y56iHVCc:BpzaLiuFKXXr11rfzH2/OPv4rirYc
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2396 2540 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00396e4da96a97766313a548570b5d35_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2396 2540 00396e4da96a97766313a548570b5d35_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2396 2540 00396e4da96a97766313a548570b5d35_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2396 2540 00396e4da96a97766313a548570b5d35_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2396 2540 00396e4da96a97766313a548570b5d35_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\00396e4da96a97766313a548570b5d35_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\00396e4da96a97766313a548570b5d35_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2540 -s 362⤵
- Program crash
PID:2396
-