Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 19:06
Behavioral task
behavioral1
Sample
ebc7b2a46f65fe91c834cf9773777301_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ebc7b2a46f65fe91c834cf9773777301_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
ebc7b2a46f65fe91c834cf9773777301_JaffaCakes118.dll
-
Size
738KB
-
MD5
ebc7b2a46f65fe91c834cf9773777301
-
SHA1
1f0a21703405c666fd189d09b00031d31b4b56f9
-
SHA256
91d326bf4310c4ba56218ebee53ee8ee1d7a6434e62666fe4c6dcd1a2736de1f
-
SHA512
9948743dfc6d4dd1e4cfdf4f51d27ba6a67d381391560e0802438ae32571fedffb67dfd1ee606c6a117a899c8a6872db6ea717b2786a039fb50df8392ef230fd
-
SSDEEP
12288:8f68zjnT+2a8+p0/IARbJkale360zCA9JK7LdBzSZd6Z/+rXm5AQKa8/VyFcajNp:8jjny2a8S0/1EaleYUKn2ZY2TmAQN0Vi
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2064-0-0x0000000000BC0000-0x0000000000D74000-memory.dmp vmprotect behavioral1/memory/2064-1-0x0000000000BC0000-0x0000000000D74000-memory.dmp vmprotect behavioral1/memory/2064-2-0x0000000000BC0000-0x0000000000D74000-memory.dmp vmprotect behavioral1/memory/2064-3-0x0000000000BC0000-0x0000000000D74000-memory.dmp vmprotect behavioral1/memory/2064-4-0x0000000000BC0000-0x0000000000D74000-memory.dmp vmprotect behavioral1/memory/2064-5-0x0000000000BC0000-0x0000000000D74000-memory.dmp vmprotect -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2064 1708 rundll32.exe 27 PID 1708 wrote to memory of 2064 1708 rundll32.exe 27 PID 1708 wrote to memory of 2064 1708 rundll32.exe 27 PID 1708 wrote to memory of 2064 1708 rundll32.exe 27 PID 1708 wrote to memory of 2064 1708 rundll32.exe 27 PID 1708 wrote to memory of 2064 1708 rundll32.exe 27 PID 1708 wrote to memory of 2064 1708 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ebc7b2a46f65fe91c834cf9773777301_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ebc7b2a46f65fe91c834cf9773777301_JaffaCakes118.dll,#12⤵PID:2064
-