Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
222aa47045b91d67a6e8f4d976a7ee0d_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
222aa47045b91d67a6e8f4d976a7ee0d_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
222aa47045b91d67a6e8f4d976a7ee0d_JaffaCakes118.dll
-
Size
25KB
-
MD5
222aa47045b91d67a6e8f4d976a7ee0d
-
SHA1
40e8ccde9fc5045bc1c0529e3d35fcf1f746b287
-
SHA256
48fd67afbdd0ca80ed993e65c861aaf83e1b2362d3ebd522c008e3aeec553e31
-
SHA512
4ae1f7d8cf405c61f1709d09dfea2ae9e045099877c9c79e35ce50b6a7ee2c0091496bbf2a93d8cca839b057b0bf2c7897c6a5ee86701ce8a13f9281d3717674
-
SSDEEP
768:xJcyKWeNGuCCc6nEgRft4Iy2VQ/xXzqH0:xm9BCCVEit4Iy9xDq
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\twain_86.dll rundll32.exe File created C:\Windows\linkinfo.dll rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2724 2128 rundll32.exe 83 PID 2128 wrote to memory of 2724 2128 rundll32.exe 83 PID 2128 wrote to memory of 2724 2128 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\222aa47045b91d67a6e8f4d976a7ee0d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\222aa47045b91d67a6e8f4d976a7ee0d_JaffaCakes118.dll,#12⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:2724
-