Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 07:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e96c94e4abaaa291a06c0b612c7723c8_JaffaCakes118.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
e96c94e4abaaa291a06c0b612c7723c8_JaffaCakes118.dll
-
Size
184KB
-
MD5
e96c94e4abaaa291a06c0b612c7723c8
-
SHA1
51bc47e783ce58d4d540a731364d0db818f163e3
-
SHA256
03e8b8fc0db223e8a16660a292e149f00802441f0990cd14f29636c5970eb3ad
-
SHA512
f8619baf9d3c1f629682371d0114d61a01dba5961067cfffc7c7c47e316f0b2969068638e6fb9c621d330b643c2c22bb907d9d798633fbff9455d194655b4382
-
SSDEEP
3072:ohd6lp2ffOeP3gv+i4W63iFfKfXM9mQltYwgO226+f33JEVQcY:o3fOeIv54W6SFKfc9me9v9/JEV
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
51.79.50.122:443
222.124.142.67:10443
138.201.222.158:4664
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral1/memory/2196-0-0x0000000075110000-0x0000000075140000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2212 2196 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2196 2820 rundll32.exe 28 PID 2820 wrote to memory of 2196 2820 rundll32.exe 28 PID 2820 wrote to memory of 2196 2820 rundll32.exe 28 PID 2820 wrote to memory of 2196 2820 rundll32.exe 28 PID 2820 wrote to memory of 2196 2820 rundll32.exe 28 PID 2820 wrote to memory of 2196 2820 rundll32.exe 28 PID 2820 wrote to memory of 2196 2820 rundll32.exe 28 PID 2196 wrote to memory of 2212 2196 rundll32.exe 29 PID 2196 wrote to memory of 2212 2196 rundll32.exe 29 PID 2196 wrote to memory of 2212 2196 rundll32.exe 29 PID 2196 wrote to memory of 2212 2196 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e96c94e4abaaa291a06c0b612c7723c8_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e96c94e4abaaa291a06c0b612c7723c8_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 2803⤵
- Program crash
PID:2212
-
-