Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 14:01
Behavioral task
behavioral1
Sample
30ac17cfb8da2dddd68bcb2278581af0_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
30ac17cfb8da2dddd68bcb2278581af0_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
30ac17cfb8da2dddd68bcb2278581af0_JaffaCakes118.dll
-
Size
70KB
-
MD5
30ac17cfb8da2dddd68bcb2278581af0
-
SHA1
fec563b616d3291941a3fdfee6657d2681a4b873
-
SHA256
1836aabbb6ce94a1650c7cc13169bfdd14ce90d4bb8f62c6c68adee572263ff8
-
SHA512
8879351c18665b7fed8c81693850044f30b7e81b97221b49a04faa6c89fdc354e118b15c1c33e61a0f1c8ad45bbbceaf6bbc562e80ab2832b6787a6458f11e4a
-
SSDEEP
1536:8XLwtq0c49MKioFjSz1UFLE/dW5MMbKl89h9LMTlp/8zWqlLqw7t1FVSr77Gnout:8XLwt/FiaU1Uq/dWFbNr8azD7VS372oS
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3260-0-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/3260-1-0x0000000000400000-0x0000000000436000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4416 3260 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3292 wrote to memory of 3260 3292 regsvr32.exe 89 PID 3292 wrote to memory of 3260 3292 regsvr32.exe 89 PID 3292 wrote to memory of 3260 3292 regsvr32.exe 89
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\30ac17cfb8da2dddd68bcb2278581af0_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\30ac17cfb8da2dddd68bcb2278581af0_JaffaCakes118.dll2⤵PID:3260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3260 -s 6563⤵
- Program crash
PID:4416
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3260 -ip 32601⤵PID:3296
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4388,i,18267267250369716772,14567143188126594249,262144 --variations-seed-version --mojo-platform-channel-handle=4636 /prefetch:81⤵PID:3580