Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 22:21
Behavioral task
behavioral1
Sample
2e0755a868023764d562863b7f5be5a7_JaffaCakes118.dll
Resource
win7-20240705-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2e0755a868023764d562863b7f5be5a7_JaffaCakes118.dll
Resource
win10v2004-20240704-en
2 signatures
150 seconds
General
-
Target
2e0755a868023764d562863b7f5be5a7_JaffaCakes118.dll
-
Size
50KB
-
MD5
2e0755a868023764d562863b7f5be5a7
-
SHA1
7cb30126db3f459c092ef1939cf7dcaea5b30f16
-
SHA256
1111710409f20b91f4c268eda9b5853a4cd5ab6b036ba1596843059275a227b6
-
SHA512
05ef0f6bf88a6fa9793efa74688f33513c56d830a5290eae96a498f6a5295d3e3bcf7693713f473d37d463bed7ebf5c956b353d4ae9b8967698126e0c171cfca
-
SSDEEP
1536:n7ZLNPp9pZBMZcwnWQ/RC3Ri//jmN9VCnE6oWd:7Zppa0Q/2i//OM
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4748-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4484 wrote to memory of 4748 4484 rundll32.exe 82 PID 4484 wrote to memory of 4748 4484 rundll32.exe 82 PID 4484 wrote to memory of 4748 4484 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2e0755a868023764d562863b7f5be5a7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2e0755a868023764d562863b7f5be5a7_JaffaCakes118.dll,#12⤵PID:4748
-