Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/12/2024, 12:48
Behavioral task
behavioral1
Sample
JaffaCakes118_af3b18fc4f1f234c9ea3b60184387a73a5b1a8bbe484e06fdd47646d8080b3bb.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_af3b18fc4f1f234c9ea3b60184387a73a5b1a8bbe484e06fdd47646d8080b3bb.ps1
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_af3b18fc4f1f234c9ea3b60184387a73a5b1a8bbe484e06fdd47646d8080b3bb.ps1
-
Size
8KB
-
MD5
0a52df917b493a6c3e09ecc86a64f76b
-
SHA1
1437864e97e185c6450ffbfe0ce525f1ff65a7ea
-
SHA256
af3b18fc4f1f234c9ea3b60184387a73a5b1a8bbe484e06fdd47646d8080b3bb
-
SHA512
279055e19e953ad47ea83f34e9ea694de5be2eb8234becce8fc0d08d83d4dff2762f02721fb053db6bc9970b2847aafa2f5024a1d3d10831e3ccd0f13d05af1b
-
SSDEEP
192:/RI/Zp7Xg1o75DLM7r3uO62Vpnb/P3n19BsOqa5DPMjx70h0VpOx:udg279ur+O62VRz319SXap2xgh0Vwx
Malware Config
Signatures
-
pid Process 2648 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2648 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2648 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_af3b18fc4f1f234c9ea3b60184387a73a5b1a8bbe484e06fdd47646d8080b3bb.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648