Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 12:47
Static task
static1
Behavioral task
behavioral1
Sample
01666a5fd391f345e99e7c7812ecb29a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01666a5fd391f345e99e7c7812ecb29a_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
01666a5fd391f345e99e7c7812ecb29a_JaffaCakes118.exe
-
Size
28KB
-
MD5
01666a5fd391f345e99e7c7812ecb29a
-
SHA1
25aa171f5e7605270585aab0d5c5e594f767a277
-
SHA256
793500ffcef3bfc6d1650cfbebdeaec278080004eb7dfe3c8f3cb32fbb9284d7
-
SHA512
77aad6ef39663720d97b448aefb29d3506b9d023a35070e199daa95fef23bcb4f4465a25e17f68b0e44bf793f37218793de90e8f8c5847d2e5fd7dc7afd16a41
-
SSDEEP
192:P7sgZt/3a1qczc1QAgglhpmyJAW/jJUDYSnrd0cCN45RgFVPC40wjL19N9NBEDO0:PZ3cuQGSyuMSJV5wV66JUTL
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2856 1872 WerFault.exe 27 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01666a5fd391f345e99e7c7812ecb29a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2856 1872 01666a5fd391f345e99e7c7812ecb29a_JaffaCakes118.exe 28 PID 1872 wrote to memory of 2856 1872 01666a5fd391f345e99e7c7812ecb29a_JaffaCakes118.exe 28 PID 1872 wrote to memory of 2856 1872 01666a5fd391f345e99e7c7812ecb29a_JaffaCakes118.exe 28 PID 1872 wrote to memory of 2856 1872 01666a5fd391f345e99e7c7812ecb29a_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\01666a5fd391f345e99e7c7812ecb29a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\01666a5fd391f345e99e7c7812ecb29a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 882⤵
- Program crash
PID:2856
-