Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
21302f4c2cb6b3dc8cb18e5252bd26b9_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
21302f4c2cb6b3dc8cb18e5252bd26b9_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
21302f4c2cb6b3dc8cb18e5252bd26b9_JaffaCakes118.dll
-
Size
63KB
-
MD5
21302f4c2cb6b3dc8cb18e5252bd26b9
-
SHA1
441499e23e0105a05bd45f0ae1f6f4650e026fc7
-
SHA256
5636e242cb23f92db9b0c5211c176182daf617fc230c3fb53cd5a1274d1c46d3
-
SHA512
fdae984a03581f6bacbced6f2493e7218a54433ff2ef3554b254644cac8d56d707cb2b7772d403821f3553b93b1edd31f94d5206c6b45851597133ddb5795bd9
-
SSDEEP
1536:pDAZqF5L3ujqZVk1FbE0ScQyAHcpV7vs1ULLAKOaRnRD:pXn2zbrSc/AaV41ULsKOaRnR
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4668 wrote to memory of 4348 4668 rundll32.exe 81 PID 4668 wrote to memory of 4348 4668 rundll32.exe 81 PID 4668 wrote to memory of 4348 4668 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21302f4c2cb6b3dc8cb18e5252bd26b9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21302f4c2cb6b3dc8cb18e5252bd26b9_JaffaCakes118.dll,#12⤵PID:4348
-