Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
2d2001f21ee3d42bf093bc9ac0195e22_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d2001f21ee3d42bf093bc9ac0195e22_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
2d2001f21ee3d42bf093bc9ac0195e22_JaffaCakes118.dll
-
Size
318KB
-
MD5
2d2001f21ee3d42bf093bc9ac0195e22
-
SHA1
8d9f3b1d92afd5b09d6ebbe20680adbbebd3daf4
-
SHA256
50c0311db5e4f587cb5b5a041ee44b93f30cec6c836cd7cf0a5efe066e6181d8
-
SHA512
bfdba70b1c57cc6068010037145fd756d15d0e4eaeccaf7bf1f066c00642658b8b7363fc1c4a4149f04e292a59cf9e55fe8206e0c8367fdc5cad4eb13f2d636e
-
SSDEEP
6144:mvDDHy5z2wg9btsWXxntETMF4efN3VnlfxG4x+7UX9lwdpPbkg8TF+8g:GDS5zng5+8n8vMVlZF+7UTUTkg8R+8g
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5100 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3668 wrote to memory of 5100 3668 rundll32.exe 82 PID 3668 wrote to memory of 5100 3668 rundll32.exe 82 PID 3668 wrote to memory of 5100 3668 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d2001f21ee3d42bf093bc9ac0195e22_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d2001f21ee3d42bf093bc9ac0195e22_JaffaCakes118.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:5100
-