Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
32e6d7f6edd...18.exe
windows7-x64
72e6d7f6edd...18.exe
windows10-2004-x64
7$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$TEMP/vidxcore.dll
windows7-x64
1$TEMP/vidxcore.dll
windows10-2004-x64
1Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
94s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240708-en -
resource tags
arch:x64arch:x86image:win10v2004-20240708-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
2e6d7f6edddd23b9cbcb658c0858423b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e6d7f6edddd23b9cbcb658c0858423b_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DcryptDll.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DcryptDll.dll
Resource
win10v2004-20240708-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
$TEMP/vidxcore.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$TEMP/vidxcore.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
Uninstall.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Uninstall.exe
Resource
win10v2004-20240704-en
General
-
Target
$PLUGINSDIR/DcryptDll.dll
-
Size
10KB
-
MD5
69dc2ed40717e5a0dfa3feaa902f448e
-
SHA1
07a6a0b6028a92e0c822cfe9b119aa1e81b28a79
-
SHA256
73e8489b06789803dcab0f4bcae4281f1477ec652f80714c3b78671f73cfefad
-
SHA512
f41e457466fcc979864829861bf421ad2589ec6b5afc81d19424f7af285ce1fb7ce25cc4067e53cd379621b5b8098882210e4535a4d53555b7816edcc2186a3c
-
SSDEEP
192:ytTlNqjCZv12CDkFhrF5+ykYF8IwWzS3+1ZxIujmMAm:MTlEWZEjF5/yIwp3gIuj
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 5112 3200 WerFault.exe 80 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3156 wrote to memory of 3200 3156 rundll32.exe 80 PID 3156 wrote to memory of 3200 3156 rundll32.exe 80 PID 3156 wrote to memory of 3200 3156 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\DcryptDll.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\DcryptDll.dll,#12⤵PID:3200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 6003⤵
- Program crash
PID:5112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3200 -ip 32001⤵PID:4736