Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/01/2025, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe
-
Size
569KB
-
MD5
afe238e76e6f9a5bdaddc4eafa099c1c
-
SHA1
827f80895a6c346d218343ea87cb581e459eaba2
-
SHA256
5a6aabdbf67cc4ca0262f3d82a098d57c01e1c335e47597982420719f5c8ee1b
-
SHA512
7e9e212f86cc3d696da293466a35be8614ea2715eceb58a6d4aa60f0ce1a9c2a6b5e2f043284e6a91fd3476adfcbe259c613e0aff31ee8eb10d942a72deed764
-
SSDEEP
12288:46J/ZsDPDXWsjZ4s2JQUCM2SuGNmYSTeq:46pZs7DmsispUCM9V9Ce
Malware Config
Extracted
formbook
4.1
d7ln
bulut-imza.com
gotastebuds.com
shutupmags.com
clocksport.com
toweryachtcounsel.com
kingcopier.com
pluspersona.com
inchallahe.com
unclonedconsulting.com
ccdt168.com
tonyzheng.xyz
voiceoftheepeople.com
cicapital.xyz
offxpro.com
loyatiproductions.com
makemebuystuff.com
incuba8labs.com
remparka.com
newstft.com
bgame.pro
croniesnft.xyz
petaouchnock.site
gavesett.com
smarthousegroup.net
kkqdqj.mobi
glatdelate.quest
sharpmage.com
penis.today
squidscatter.com
digfinancial.com
imx.fund
bigbet3269.com
leatherlidinserts.net
eyecollection-nishigifu.com
wagyuchefs.com
cafeandbakecestbon.com
appsy.tech
johnmaxwelltam.com
eternity-warm.com
naebidynamic.com
landgrunt.com
chap-immo.com
wgzywz.com
zawovu.com
shortsvault.com
squidgameoutfitsss.com
keaneoil.com
v44881.com
spartanboardgames.com
rotcid.xyz
qvconsultants.com
reinorshine.com
turkeyetrade.com
webcomprei.com
00010shou.com
tiffanyandjose.com
todd4mayor.com
designbydb.com
higherj.com
delicatmnl.com
huamanishop.com
pinkle-store.com
gatewaytothegreatoceanroad.com
felerritst.quest
mottpolis.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2712-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2124 set thread context of 2712 2124 JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2812 2712 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2712 2124 JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe 31 PID 2124 wrote to memory of 2712 2124 JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe 31 PID 2124 wrote to memory of 2712 2124 JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe 31 PID 2124 wrote to memory of 2712 2124 JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe 31 PID 2124 wrote to memory of 2712 2124 JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe 31 PID 2124 wrote to memory of 2712 2124 JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe 31 PID 2124 wrote to memory of 2712 2124 JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe 31 PID 2712 wrote to memory of 2812 2712 JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe 32 PID 2712 wrote to memory of 2812 2712 JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe 32 PID 2712 wrote to memory of 2812 2712 JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe 32 PID 2712 wrote to memory of 2812 2712 JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_afe238e76e6f9a5bdaddc4eafa099c1c.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 363⤵
- Program crash
PID:2812
-
-