Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 01:58
Behavioral task
behavioral1
Sample
2a972e30c33169f712b594c218737336_JaffaCakes118.dll
Resource
win7-20240704-en
4 signatures
150 seconds
General
-
Target
2a972e30c33169f712b594c218737336_JaffaCakes118.dll
-
Size
80KB
-
MD5
2a972e30c33169f712b594c218737336
-
SHA1
2243f605e4312e6d26b4a9fcd1bf9c70de61348d
-
SHA256
51e19e9783b786a432472ea696219e28feb7ab579097a978f37eab10b1882970
-
SHA512
3c20f8f7b78c012e9b99a94d23aa4cc87772660f03860e0a4cc9b74119d5fc1aeaa8c15f021ab223e8b96e898089c9e7cac0dc0332d3120e7d6507ac2a813bce
-
SSDEEP
768:/MFz18Cn+Im/aVtQeUMQ9adrsa2Vru5dCnrcqbGfzHWxZ:e/m/2tFUMRdrV2VydCrhSfyxZ
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/memory/3540-0-0x0000000010000000-0x0000000010014000-memory.dmp family_blackmoon behavioral2/memory/3540-1-0x0000000010000000-0x0000000010014000-memory.dmp family_blackmoon -
Blocklisted process makes network request 31 IoCs
flow pid Process 13 3540 rundll32.exe 16 3540 rundll32.exe 17 3540 rundll32.exe 18 3540 rundll32.exe 19 3540 rundll32.exe 20 3540 rundll32.exe 21 3540 rundll32.exe 22 3540 rundll32.exe 23 3540 rundll32.exe 24 3540 rundll32.exe 25 3540 rundll32.exe 26 3540 rundll32.exe 27 3540 rundll32.exe 28 3540 rundll32.exe 29 3540 rundll32.exe 30 3540 rundll32.exe 31 3540 rundll32.exe 32 3540 rundll32.exe 33 3540 rundll32.exe 34 3540 rundll32.exe 37 3540 rundll32.exe 48 3540 rundll32.exe 50 3540 rundll32.exe 51 3540 rundll32.exe 52 3540 rundll32.exe 53 3540 rundll32.exe 54 3540 rundll32.exe 55 3540 rundll32.exe 56 3540 rundll32.exe 60 3540 rundll32.exe 65 3540 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 440 wrote to memory of 3540 440 rundll32.exe 83 PID 440 wrote to memory of 3540 440 rundll32.exe 83 PID 440 wrote to memory of 3540 440 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2a972e30c33169f712b594c218737336_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2a972e30c33169f712b594c218737336_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
PID:3540
-