Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 05:57
Static task
static1
Behavioral task
behavioral1
Sample
f2d5dc82ad36e11d501a874fba8569ee_JaffaCakes118.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f2d5dc82ad36e11d501a874fba8569ee_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
f2d5dc82ad36e11d501a874fba8569ee_JaffaCakes118.dll
-
Size
7KB
-
MD5
f2d5dc82ad36e11d501a874fba8569ee
-
SHA1
8cec6ff68873a80ef8a6f072342f6eca5effca9f
-
SHA256
b82a2dbb8bc6359c6594b29a899ec3a23f3c9a5c605c91a5cb28747b75f60c20
-
SHA512
4c3858b84cc4ede3f88d322e80f72795d731ff2c9e7230a2aab32513584efb5a6d1d5a8ab0928edc77a0c64aa35bd272852842a0ee5cd1255e4e51a69d5404df
-
SSDEEP
96:jOWtBb9DzeUkE5Go6ccayCbFlsKuiQ7nP2NfR3qaf9ioOJuWp:jOWtp9DwEc8pHL1uiYnKfj8ocu
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3020 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3020 3004 rundll32.exe 28 PID 3004 wrote to memory of 3020 3004 rundll32.exe 28 PID 3004 wrote to memory of 3020 3004 rundll32.exe 28 PID 3004 wrote to memory of 3020 3004 rundll32.exe 28 PID 3004 wrote to memory of 3020 3004 rundll32.exe 28 PID 3004 wrote to memory of 3020 3004 rundll32.exe 28 PID 3004 wrote to memory of 3020 3004 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f2d5dc82ad36e11d501a874fba8569ee_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f2d5dc82ad36e11d501a874fba8569ee_JaffaCakes118.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:3020
-