Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 21:41
Behavioral task
behavioral1
Sample
0abfa977863eeaf6dcc36c48d52acd7e_JaffaCakes118.dll
Resource
win7-20240508-en
3 signatures
150 seconds
General
-
Target
0abfa977863eeaf6dcc36c48d52acd7e_JaffaCakes118.dll
-
Size
95KB
-
MD5
0abfa977863eeaf6dcc36c48d52acd7e
-
SHA1
2c14bb58e01bcf323f12db270106238e0bb7801e
-
SHA256
a66ef06d0d938f2a5aac536917c350274c1308efe66efc17b8610e984d343a00
-
SHA512
fc9595aad11f5e6b525d1573fcb8b22f95767ff54aa22aaf4781e5df67cfc1de72dc9cdf8180d7c8cb1b25b7c1666c81fd2b8e63b38bae7c2b9e4b5dac50601b
-
SSDEEP
1536:jhx5ngZsz6Ha/EAIRkV73NsWWovhXc4hifayQFKhMTw+0V4:jf5ngZs8aTIRm73woZXbh0ayQUSTw+0y
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2992-0-0x0000000010000000-0x000000001001B000-memory.dmp family_gh0strat behavioral1/memory/2992-1-0x0000000010000000-0x000000001001B000-memory.dmp family_gh0strat -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2992 3016 rundll32.exe 28 PID 3016 wrote to memory of 2992 3016 rundll32.exe 28 PID 3016 wrote to memory of 2992 3016 rundll32.exe 28 PID 3016 wrote to memory of 2992 3016 rundll32.exe 28 PID 3016 wrote to memory of 2992 3016 rundll32.exe 28 PID 3016 wrote to memory of 2992 3016 rundll32.exe 28 PID 3016 wrote to memory of 2992 3016 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0abfa977863eeaf6dcc36c48d52acd7e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0abfa977863eeaf6dcc36c48d52acd7e_JaffaCakes118.dll,#12⤵PID:2992
-