Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
ecb8975e2aa1205503e773256d02a5a4_JaffaCakes118.dll
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
ecb8975e2aa1205503e773256d02a5a4_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
ecb8975e2aa1205503e773256d02a5a4_JaffaCakes118.dll
-
Size
264KB
-
MD5
ecb8975e2aa1205503e773256d02a5a4
-
SHA1
06020aa296bef9c406afbe0e47102d316e4f5e18
-
SHA256
e8333c71465e70a73f0add91ca6527721a4cbebc1762b242a5bd2977d9418626
-
SHA512
3c66001eaa1a908d037faefd9b66e59a6dfb9eccdbc17f1e4083b0c9719c2b64ac9a48d09f9a358391f6884b9aa03f7581953b9969a0985bf919b38a22775010
-
SSDEEP
6144:ri2eKGpZ2Cz2anQ+blUNfsXXde6yo49DeGZ0rrUNV5m1aMCMj4q7p9D6lE:XtGpZ2jaQg+9sX3yl9yGQrU4ovch
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Djohohovoja = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\ecb8975e2aa1205503e773256d02a5a4_JaffaCakes118.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4016 rundll32.exe 4016 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4016 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1104 wrote to memory of 4016 1104 rundll32.exe 84 PID 1104 wrote to memory of 4016 1104 rundll32.exe 84 PID 1104 wrote to memory of 4016 1104 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ecb8975e2aa1205503e773256d02a5a4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ecb8975e2aa1205503e773256d02a5a4_JaffaCakes118.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4016
-