Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13/01/2025, 20:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2e3fe385d738c1b65ef5f5ae04841b89.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_2e3fe385d738c1b65ef5f5ae04841b89.exe
-
Size
107KB
-
MD5
2e3fe385d738c1b65ef5f5ae04841b89
-
SHA1
686484b00952c659bec7eb4941b6e826f51a33c3
-
SHA256
10f7577c57b71ded9be26160b4a9559d1586333f30c3109eda67aa384f040647
-
SHA512
7573c40d5bf891fce4eee39f0e2f4fe5c9f762946610828de549a3f9e31cb1d60d85f1e873799d8032f731a7a4d9cb594afe9255bc3f33f2730a93f8d1681b68
-
SSDEEP
1536:e+FDoKtniY1u7Nn2JFkC2styJjCKICFjC7EWisS+5mlatSfkZY:e+FDzK71QkbstyJjCKICpC72s/mlaXY
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1668 3044 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2e3fe385d738c1b65ef5f5ae04841b89.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 1668 3044 JaffaCakes118_2e3fe385d738c1b65ef5f5ae04841b89.exe 30 PID 3044 wrote to memory of 1668 3044 JaffaCakes118_2e3fe385d738c1b65ef5f5ae04841b89.exe 30 PID 3044 wrote to memory of 1668 3044 JaffaCakes118_2e3fe385d738c1b65ef5f5ae04841b89.exe 30 PID 3044 wrote to memory of 1668 3044 JaffaCakes118_2e3fe385d738c1b65ef5f5ae04841b89.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2e3fe385d738c1b65ef5f5ae04841b89.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2e3fe385d738c1b65ef5f5ae04841b89.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 1282⤵
- Program crash
PID:1668
-