Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2024, 04:59
Static task
static1
Behavioral task
behavioral1
Sample
29befbc6c8f7f6405dbeb5b3641ecda1_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
29befbc6c8f7f6405dbeb5b3641ecda1_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
29befbc6c8f7f6405dbeb5b3641ecda1_JaffaCakes118.dll
-
Size
204KB
-
MD5
29befbc6c8f7f6405dbeb5b3641ecda1
-
SHA1
126d09b5f0ce20e8641d962c4cd2d317cd7f3559
-
SHA256
15b140103e0ae309e971e6cbf60cc369a4d04e504009bbb4f64f8a5b8291b70f
-
SHA512
3ccf021cb95651a203a087c2f789134aa73eb429d6a28ed193952033748e4f31ee390146d1df682fa8226c4c6c75a9ddc0bf4f7911e79363bfa989f13237a684
-
SSDEEP
3072:6Fr/n5sE+9oWcexATaggljmeIK3BpeIFciV3jU4nEvlTaPxpg0Vi8KGLYoLW:AEoWcoSIKIFc0N4kEc1ny
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4124 rundll32mgr.exe -
resource yara_rule behavioral2/memory/4124-5-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/files/0x000700000002325a-4.dat upx behavioral2/memory/4124-8-0x0000000000400000-0x0000000000454000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 452 4124 WerFault.exe 85 3124 404 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3756 wrote to memory of 404 3756 rundll32.exe 84 PID 3756 wrote to memory of 404 3756 rundll32.exe 84 PID 3756 wrote to memory of 404 3756 rundll32.exe 84 PID 404 wrote to memory of 4124 404 rundll32.exe 85 PID 404 wrote to memory of 4124 404 rundll32.exe 85 PID 404 wrote to memory of 4124 404 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\29befbc6c8f7f6405dbeb5b3641ecda1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\29befbc6c8f7f6405dbeb5b3641ecda1_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
PID:4124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 2484⤵
- Program crash
PID:452
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 6083⤵
- Program crash
PID:3124
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4124 -ip 41241⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 404 -ip 4041⤵PID:2636
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD539ba7f790512d1af40cc864189175cb7
SHA1da5f35bed908b1a0d08b7639d76cf2d711789e29
SHA256b7bf5c2afcbb6f664966c7b2cd72ac8cc26f95199ff49a490550858e83a91e75
SHA5120b59b197cf1123bacd7badb5b359ec17c45d99e297893a28b5130a724d6ba12465f361d7872ab3ebc527ae317735c1182d3d71bcd53b4773dbca3cd82ea1d76e