Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 19:24
Behavioral task
behavioral1
Sample
30a680c6952822156cdeac363fdc1a08_JaffaCakes118.dll
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
30a680c6952822156cdeac363fdc1a08_JaffaCakes118.dll
Resource
win10v2004-20240508-en
3 signatures
150 seconds
General
-
Target
30a680c6952822156cdeac363fdc1a08_JaffaCakes118.dll
-
Size
4.4MB
-
MD5
30a680c6952822156cdeac363fdc1a08
-
SHA1
8ec9a180333b893a8c3cb1b1e599470d6e5c1ae0
-
SHA256
c797fbb83fce5acb22793e9f5ff135d47ae05eee8ad72ec005651330d75d3a04
-
SHA512
7d8ce14c44a50fa63b1b683af0d0a23de278ff1b9b03fa8474391f065e4f34319bffd654422802025b96376a7613ec60c77ffdefaf1da9ac9db74b8596b68e71
-
SSDEEP
98304:9vy0/7Jx/Bs7IsuC1Z2GP04sFetpaCcxMVc0XVHsZbkQyPBPl2:9vy0/7Jx/CIsuC1Z2GP04sFeIMG0aZbn
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3920-2-0x0000000074A60000-0x0000000074ED2000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3920 rundll32.exe 3920 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4552 wrote to memory of 3920 4552 rundll32.exe 82 PID 4552 wrote to memory of 3920 4552 rundll32.exe 82 PID 4552 wrote to memory of 3920 4552 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\30a680c6952822156cdeac363fdc1a08_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\30a680c6952822156cdeac363fdc1a08_JaffaCakes118.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920
-