Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 02:41
Behavioral task
behavioral1
Sample
2ab3dfc59fe7e8cc382a12499dc48d98_JaffaCakes118.dll
Resource
win7-20240220-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2ab3dfc59fe7e8cc382a12499dc48d98_JaffaCakes118.dll
Resource
win10v2004-20240704-en
3 signatures
150 seconds
General
-
Target
2ab3dfc59fe7e8cc382a12499dc48d98_JaffaCakes118.dll
-
Size
62KB
-
MD5
2ab3dfc59fe7e8cc382a12499dc48d98
-
SHA1
a167628ae8b5c20abc67e9fe1620e46926ce4130
-
SHA256
faeeaead7a08444c696c21825c1a93042f2cd7b8e83125198a85ca22183d0e02
-
SHA512
9948e5f9d8cb1e71243102334468f3a567537722c7bd10dc694a1cf8e487bc0dbed8409a29c1d2d9609a47e3be6af89c8dc6f9e2592d7e1b35e7ead05fa5c3cb
-
SSDEEP
1536:90gYxJs6md2GQQ/XufcLDHlgQIcaX2nJ4ifWT5J40C65r:rYAvdJvXuZQIchWl9
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1600-0-0x0000000010000000-0x0000000010011000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1600 rundll32.exe 1600 rundll32.exe 1600 rundll32.exe 1600 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2444 wrote to memory of 1600 2444 rundll32.exe 82 PID 2444 wrote to memory of 1600 2444 rundll32.exe 82 PID 2444 wrote to memory of 1600 2444 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ab3dfc59fe7e8cc382a12499dc48d98_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ab3dfc59fe7e8cc382a12499dc48d98_JaffaCakes118.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-