Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/12/2024, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ed7953e4573f862ce1ff418416e392670944a7d1f25ce25b2164c903470b6daf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ed7953e4573f862ce1ff418416e392670944a7d1f25ce25b2164c903470b6daf.vbs
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_ed7953e4573f862ce1ff418416e392670944a7d1f25ce25b2164c903470b6daf.vbs
-
Size
7KB
-
MD5
2d279b1ff24694aedac0940f3e297a71
-
SHA1
983522f60204a435e0b05ee93608303c177a296d
-
SHA256
ed7953e4573f862ce1ff418416e392670944a7d1f25ce25b2164c903470b6daf
-
SHA512
3948feaefed27971edf6d8f725a867b6975f54e9f9e183dfa8f61482303a300cb7910a920cf98ee5e7b65ef4e302f6da4b39d9a9a69cfd2b9c71af0cd1e9cde3
-
SSDEEP
96:joRhn5eXGILYvLL8ervgBsM+PzzrDpoI1yF1dMFVBgDlBu3r77aC:UhnQlYvLL8e8GB9XN7BgHu37r
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.77.130:8080
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 1 IoCs
pid Process 2752 gvUnDdEkO.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2752 2316 WScript.exe 30 PID 2316 wrote to memory of 2752 2316 WScript.exe 30 PID 2316 wrote to memory of 2752 2316 WScript.exe 30 PID 2316 wrote to memory of 2752 2316 WScript.exe 30
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ed7953e4573f862ce1ff418416e392670944a7d1f25ce25b2164c903470b6daf.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\rad3BB2E.tmp\gvUnDdEkO.exe"C:\Users\Admin\AppData\Local\Temp\rad3BB2E.tmp\gvUnDdEkO.exe"2⤵
- Executes dropped EXE
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD51d47107ef6844fb699ae752396f92f8c
SHA193aa8d70d4bccfb9c02ca049b2c7fe82e1347554
SHA256d3f8a7c6d7e89756278d20a9c0de00a9809bf374ec0a40c20500b809607344b7
SHA512844bf95165246687ae55f1ac485c01181709fb9d03c80aa9b0f2c534ee34040cc92d70218366f183ee8a746688bfe7c0dafd81ab43d9815c31c38f06e4fdff5c