Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 08:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
197071460e15ffb15f1bbd6dc8f89eca_JaffaCakes118.dll
Resource
win7-20240220-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
197071460e15ffb15f1bbd6dc8f89eca_JaffaCakes118.dll
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
197071460e15ffb15f1bbd6dc8f89eca_JaffaCakes118.dll
-
Size
48KB
-
MD5
197071460e15ffb15f1bbd6dc8f89eca
-
SHA1
73c0508dd7850d49b403379cff03113a9265c5fa
-
SHA256
84d3446479320574ebc180f795e1f46f2eab8016386a26d68cb503226f2aa605
-
SHA512
f8ce8c3bd325872ddf23bdbc7e80b062cb48f8f1d37b963253078ab24a55c5aa37d858fa9668393177e0944a8da9f557800d4b5a2ffc515e0060479f252001ac
-
SSDEEP
768:kah/srb61Dnyt0jkIfIbnJYeoMnbNlsoiGgqh:ku036pjnfITqMnXilqh
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3784 rundll32.exe 3784 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1448 wrote to memory of 3784 1448 rundll32.exe 91 PID 1448 wrote to memory of 3784 1448 rundll32.exe 91 PID 1448 wrote to memory of 3784 1448 rundll32.exe 91 PID 3784 wrote to memory of 3240 3784 rundll32.exe 57
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3240
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\197071460e15ffb15f1bbd6dc8f89eca_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\197071460e15ffb15f1bbd6dc8f89eca_JaffaCakes118.dll,#13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3784
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3944 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:3736