Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 07:05
Behavioral task
behavioral1
Sample
0d246bf6d72d198851dcb6bb7ce7c306_JaffaCakes118.dll
Resource
win7-20240419-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0d246bf6d72d198851dcb6bb7ce7c306_JaffaCakes118.dll
Resource
win10v2004-20240611-en
2 signatures
150 seconds
General
-
Target
0d246bf6d72d198851dcb6bb7ce7c306_JaffaCakes118.dll
-
Size
10KB
-
MD5
0d246bf6d72d198851dcb6bb7ce7c306
-
SHA1
a27659b04c0f168f973dd87fe1626afbc4b885a5
-
SHA256
6c3c8e8d5faf051ad435f7a31855add4e73c999fb357268a0e6731b135366cae
-
SHA512
dbc11f91899a7a095b523a56f40ed2e972e6e948fe9280b36121a7bb1b0422ec23289d94765c07d3cf551f06ab0fa33935f48c5893bea6977dfb46098a3d04c3
-
SSDEEP
192:UQRRREWyp+8Y2pkEXO9suOA6E97ZIWomoLaXPM8hIWiFW:n7+6196O9qAT945WKWiFW
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4772-0-0x0000000010000000-0x000000001000B000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 636 wrote to memory of 4772 636 rundll32.exe 83 PID 636 wrote to memory of 4772 636 rundll32.exe 83 PID 636 wrote to memory of 4772 636 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d246bf6d72d198851dcb6bb7ce7c306_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d246bf6d72d198851dcb6bb7ce7c306_JaffaCakes118.dll,#12⤵PID:4772
-