Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 02:11

General

  • Target

    ec752261828b01df7b4c75d4068e3809_JaffaCakes118.dll

  • Size

    66KB

  • MD5

    ec752261828b01df7b4c75d4068e3809

  • SHA1

    a11356e97d08b3d7e3611de45859237f25bfee77

  • SHA256

    740ab08f23e01f0adffed82f9dac4dfa71e9267e86831ed87d9ffad0e76f2cbb

  • SHA512

    43c0638f600bca00fafc9de300b2c6cd7d53054087415f98217d1cd3d04d3225d47299fdea451ae0dad447bf885fa90ae68901f864f6e9eceb4857a73e8ac315

  • SSDEEP

    1536:yl3E0TDoZWWv48qy/JkMp+r1EMRnQxrOcfpXEDcBQ9bxvoJw:E39P+FSMkrvRnQpOcfpXEIB0dcw

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ec752261828b01df7b4c75d4068e3809_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ec752261828b01df7b4c75d4068e3809_JaffaCakes118.dll,#1
      2⤵
        PID:1760

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1760-0-0x0000000010000000-0x000000001000E000-memory.dmp

      Filesize

      56KB