Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 17:40
Behavioral task
behavioral1
Sample
1be9bd0e5b9b2a1d7e337b981784b62e_JaffaCakes118.dll
Resource
win7-20231129-en
4 signatures
150 seconds
General
-
Target
1be9bd0e5b9b2a1d7e337b981784b62e_JaffaCakes118.dll
-
Size
1.3MB
-
MD5
1be9bd0e5b9b2a1d7e337b981784b62e
-
SHA1
4753bf06e2270b13696c2fb2ee7d875327d29e1e
-
SHA256
46768d8005c4e403343ce50560191ab58ba45e36e5d84be5a3fe2014f1ad9ee4
-
SHA512
e87d9d24496e911ff0c69431b0dfc9ba3cf9ef650a1ad91e1799535adb27a4a55998cb306d60cffaa34e3a0f31d34cc083fac4ca464a12fecdd150ba4fdb6470
-
SSDEEP
24576:bvj+a/9B2CJkup7qsHkiIiMgrgKynenXNDbEcm0eS/ho+7QTx:ua/9B2CJkeYqyenicpo+7Q
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Wine rundll32.exe -
resource yara_rule behavioral1/memory/1884-0-0x0000000010000000-0x000000001029C000-memory.dmp themida behavioral1/memory/1884-1-0x0000000010000000-0x000000001029C000-memory.dmp themida behavioral1/memory/1884-2-0x0000000010000000-0x000000001029C000-memory.dmp themida behavioral1/memory/1884-5-0x0000000010000000-0x000000001029C000-memory.dmp themida -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1884 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1884 1752 rundll32.exe 28 PID 1752 wrote to memory of 1884 1752 rundll32.exe 28 PID 1752 wrote to memory of 1884 1752 rundll32.exe 28 PID 1752 wrote to memory of 1884 1752 rundll32.exe 28 PID 1752 wrote to memory of 1884 1752 rundll32.exe 28 PID 1752 wrote to memory of 1884 1752 rundll32.exe 28 PID 1752 wrote to memory of 1884 1752 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1be9bd0e5b9b2a1d7e337b981784b62e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1be9bd0e5b9b2a1d7e337b981784b62e_JaffaCakes118.dll,#12⤵
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
PID:1884
-