Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    92s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 14:37

General

  • Target

    f834e4dfb17b80ebc3d9127b6ecb98a8_JaffaCakes118.dll

  • Size

    18KB

  • MD5

    f834e4dfb17b80ebc3d9127b6ecb98a8

  • SHA1

    be66d20ab729e2035cbe4f2f4533ef99f94a3476

  • SHA256

    10343a1f575eabf821251f2d51b56c809e24fadc5baf36159d3a006584598d2e

  • SHA512

    334bded4abcb70331d0374e94c7d2de1ff84a8280f5b7dc1d785d5df3b612bf7ef4c103ed6d5a347ae9508a952bc73451ae5ecdad47d58cf4ed5cc03e0428f0a

  • SSDEEP

    384:u59RdCyjMqlWlmQm2iGozM9NH2980xmhIWBat2K:uTCyoqlImQviy9ZOt2

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Sets file execution options in registry 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f834e4dfb17b80ebc3d9127b6ecb98a8_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f834e4dfb17b80ebc3d9127b6ecb98a8_JaffaCakes118.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Sets file execution options in registry
      PID:992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads