Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 22:44
Behavioral task
behavioral1
Sample
4a596f96a1eb6b39e07ada86e6a8bf4d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4a596f96a1eb6b39e07ada86e6a8bf4d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4a596f96a1eb6b39e07ada86e6a8bf4d_JaffaCakes118.exe
-
Size
65KB
-
MD5
4a596f96a1eb6b39e07ada86e6a8bf4d
-
SHA1
309305d26f15aeb5255ffe11907f6ff042132552
-
SHA256
a3a14a8e9f4bcc269372b3ec1d20eb580c70b33dada00cfeb49a6b6d60e2661f
-
SHA512
17e481e63f56eb1fd5fb15a24c0e1d429685981078d54a602849422f68fa3c2eb12caee618fa2ddf764d716b19262d5bc0687fd99a433e9dde04d3f2024e7ef0
-
SSDEEP
768:A8m1Sq4NQErBsH1tzoisBKQI6dObAG/dq8uW29Ifnca/yyR+P2ujfciZKPA+7Xov:isq+QV4rObAdXWpf/yU7ozNwiF
Malware Config
Signatures
-
Detect XtremeRAT payload 1 IoCs
resource yara_rule behavioral1/memory/2180-0-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2224 2180 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a596f96a1eb6b39e07ada86e6a8bf4d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2224 2180 4a596f96a1eb6b39e07ada86e6a8bf4d_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2224 2180 4a596f96a1eb6b39e07ada86e6a8bf4d_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2224 2180 4a596f96a1eb6b39e07ada86e6a8bf4d_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2224 2180 4a596f96a1eb6b39e07ada86e6a8bf4d_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a596f96a1eb6b39e07ada86e6a8bf4d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4a596f96a1eb6b39e07ada86e6a8bf4d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 1602⤵
- Program crash
PID:2224
-