Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 16:03
Static task
static1
Behavioral task
behavioral1
Sample
28c0c1be9061274f5cfc7493548157d3_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
28c0c1be9061274f5cfc7493548157d3_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
28c0c1be9061274f5cfc7493548157d3_JaffaCakes118.dll
-
Size
181KB
-
MD5
28c0c1be9061274f5cfc7493548157d3
-
SHA1
a3cdb4a25098585f153f6529d3ec24d05639946e
-
SHA256
37d0416566ff5d55dd7b4f7bfcefae6ba014fb7552985761bb4ab30bb4efb169
-
SHA512
483d7eddc2f25c7ef2a98adf2623276135c121437ffd2ef5d606f62dc9783342fe589ef71cdc348b751ff449cfae76067d534747bda1d3a0801cd18529fbd6b7
-
SSDEEP
3072:sBgrCOx5iHPi7OS9ipeVsysrYHhkOgsa4ENk7whjgQLA97M3rsBp8DDYWb:sBgrjXO67NipKKrYB7INNk7sjgQLA9uP
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\36fb rundll32.exe File created C:\Windows\SysWOW64\1051819-102 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1312 1908 rundll32.exe 29 PID 1908 wrote to memory of 1312 1908 rundll32.exe 29 PID 1908 wrote to memory of 1312 1908 rundll32.exe 29 PID 1908 wrote to memory of 1312 1908 rundll32.exe 29 PID 1908 wrote to memory of 1312 1908 rundll32.exe 29 PID 1908 wrote to memory of 1312 1908 rundll32.exe 29 PID 1908 wrote to memory of 1312 1908 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\28c0c1be9061274f5cfc7493548157d3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\28c0c1be9061274f5cfc7493548157d3_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:1312
-