Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 14:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f834e4dfb17b80ebc3d9127b6ecb98a8_JaffaCakes118.dll
Resource
win7-20240215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
f834e4dfb17b80ebc3d9127b6ecb98a8_JaffaCakes118.dll
Resource
win10v2004-20240412-en
3 signatures
150 seconds
General
-
Target
f834e4dfb17b80ebc3d9127b6ecb98a8_JaffaCakes118.dll
-
Size
18KB
-
MD5
f834e4dfb17b80ebc3d9127b6ecb98a8
-
SHA1
be66d20ab729e2035cbe4f2f4533ef99f94a3476
-
SHA256
10343a1f575eabf821251f2d51b56c809e24fadc5baf36159d3a006584598d2e
-
SHA512
334bded4abcb70331d0374e94c7d2de1ff84a8280f5b7dc1d785d5df3b612bf7ef4c103ed6d5a347ae9508a952bc73451ae5ecdad47d58cf4ed5cc03e0428f0a
-
SSDEEP
384:u59RdCyjMqlWlmQm2iGozM9NH2980xmhIWBat2K:uTCyoqlImQviy9ZOt2
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 992 rundll32.exe -
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spoolsv.exe rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spoolsv.exe\Debugger = "dgdownexe.exe" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2300 wrote to memory of 992 2300 rundll32.exe 84 PID 2300 wrote to memory of 992 2300 rundll32.exe 84 PID 2300 wrote to memory of 992 2300 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f834e4dfb17b80ebc3d9127b6ecb98a8_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f834e4dfb17b80ebc3d9127b6ecb98a8_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Sets file execution options in registry
PID:992
-