Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 01:39 UTC

General

  • Target

    084aa83720c87ed51df0d13a210f3a6a_JaffaCakes118.exe

  • Size

    122KB

  • MD5

    084aa83720c87ed51df0d13a210f3a6a

  • SHA1

    6d984daccea37221e51b8f756b9a5e7e5dd97ccd

  • SHA256

    dc762d0dfe30b1a8ed12c16286cd3c175650ac184175fc4705c1cf66d68d550f

  • SHA512

    8ede1fddceae24bf9a3327d4b677266e5800ca2f41c1036c7c5d306d81680d9a7009323b20939cc60766fc7395e418815438b18c090cca0c2c8ce603c4aed386

  • SSDEEP

    3072:yWiBnMAPtBPe811/+jSlxLsd5dGGVszCSXc9cI6RR6:Rx45u2XCG7CSsiz

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\084aa83720c87ed51df0d13a210f3a6a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\084aa83720c87ed51df0d13a210f3a6a_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Users\Admin\AppData\Local\Temp\084aa83720c87ed51df0d13a210f3a6a_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\084aa83720c87ed51df0d13a210f3a6a_JaffaCakes118.exe
      2⤵
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2360-8-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2360-9-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2360-30902-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2360-30904-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2360-30906-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2584-3-0x0000000000456000-0x0000000000458000-memory.dmp

    Filesize

    8KB

  • memory/2584-4-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2584-12-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.