Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
22c5b04b1ac0e442ff06d04d83715aac_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
22c5b04b1ac0e442ff06d04d83715aac_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
22c5b04b1ac0e442ff06d04d83715aac_JaffaCakes118.dll
-
Size
307KB
-
MD5
22c5b04b1ac0e442ff06d04d83715aac
-
SHA1
283d7120b34df72c1f9ccc6201e400db1caafd70
-
SHA256
1e51a730a79a0dbe00bf402669201e42fbd711c64e9b95fb1f4fee60a2854647
-
SHA512
2a6e40de554cf0db5490e32d3d4d94fadc91c995bf183875d8cf1dfe115309eac1835974ddb907a2854d94c13aec03e937125436b37d92005c2110fbc3fb9bcd
-
SSDEEP
6144:vMFRaqjfJRN+F8n6sUigL/5m+1Hgm4QV5hyVOa31e84BMp/Me2ligvc4edjosLl:vU3f7N+46Vp1gmjLy/MtCldtR
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 908 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3056 wrote to memory of 908 3056 rundll32.exe 28 PID 3056 wrote to memory of 908 3056 rundll32.exe 28 PID 3056 wrote to memory of 908 3056 rundll32.exe 28 PID 3056 wrote to memory of 908 3056 rundll32.exe 28 PID 3056 wrote to memory of 908 3056 rundll32.exe 28 PID 3056 wrote to memory of 908 3056 rundll32.exe 28 PID 3056 wrote to memory of 908 3056 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\22c5b04b1ac0e442ff06d04d83715aac_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\22c5b04b1ac0e442ff06d04d83715aac_JaffaCakes118.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:908
-