Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
e836c6fb83da66b7b620cde4effdc03e_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e836c6fb83da66b7b620cde4effdc03e_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
e836c6fb83da66b7b620cde4effdc03e_JaffaCakes118.dll
-
Size
93KB
-
MD5
e836c6fb83da66b7b620cde4effdc03e
-
SHA1
8a953ed4d82e4b15c023fbd3207b25060a2afd38
-
SHA256
87a3bbd5ca72346393efbb5c2a9b3800f4d38e56bb9d9c2a36edbb48f448da37
-
SHA512
9af4ff24e42521265459ff123228957edebf4bb4445eea4d79db6a10e0bbf655b1b6fb0c4cf6459d26a2e035e62f26ce4cb066d359a8fdeb85e47229df43a3f0
-
SSDEEP
1536:Mk23aww6z5IFHSjBENQntHfxq1AOeGFPtx0DPRssbXih3lRfDBdgalA/Xu:s3azlSFtHpq/e2n+uLh3lBj2/Xu
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Epiya = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\e836c6fb83da66b7b620cde4effdc03e_JaffaCakes118.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4364 rundll32.exe 4364 rundll32.exe 4364 rundll32.exe 4364 rundll32.exe 4364 rundll32.exe 4364 rundll32.exe 4364 rundll32.exe 4364 rundll32.exe 4364 rundll32.exe 4364 rundll32.exe 4364 rundll32.exe 4364 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 700 wrote to memory of 4364 700 rundll32.exe 86 PID 700 wrote to memory of 4364 700 rundll32.exe 86 PID 700 wrote to memory of 4364 700 rundll32.exe 86 PID 4364 wrote to memory of 3188 4364 rundll32.exe 99 PID 4364 wrote to memory of 3188 4364 rundll32.exe 99 PID 4364 wrote to memory of 3188 4364 rundll32.exe 99
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e836c6fb83da66b7b620cde4effdc03e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e836c6fb83da66b7b620cde4effdc03e_JaffaCakes118.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\e836c6fb83da66b7b620cde4effdc03e_JaffaCakes118.dll",iep3⤵PID:3188
-
-