Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 21:05
Static task
static1
Behavioral task
behavioral1
Sample
f453394ddce07a6837b8884b9ffdc4c7_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f453394ddce07a6837b8884b9ffdc4c7_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
f453394ddce07a6837b8884b9ffdc4c7_JaffaCakes118.dll
-
Size
106KB
-
MD5
f453394ddce07a6837b8884b9ffdc4c7
-
SHA1
78196e919f83c786acbe43e12efc4b373f49b900
-
SHA256
ba9b75330fb64de71410329bcdd7ab1e1a9721f369aa1c26a610d03efc19438c
-
SHA512
f149df4901284ba2efc9925b8ddc35707146290735fb07fed83b8489b139addfef3060bcd0a2d4cce642cbd043a15c02e4ea507d0bdca2049eab559ee4b56f0c
-
SSDEEP
1536:6BrPqz2747sE8nlUxJfvSGAMxSgo8bJgDzf1f6eejLAHnToIfxIO8dCPbwAr19:6BD47NFPfK6xjcRf6eBHTBfb82H9
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1600 wrote to memory of 952 1600 rundll32.exe 83 PID 1600 wrote to memory of 952 1600 rundll32.exe 83 PID 1600 wrote to memory of 952 1600 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f453394ddce07a6837b8884b9ffdc4c7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f453394ddce07a6837b8884b9ffdc4c7_JaffaCakes118.dll,#12⤵PID:952
-