Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 01:01
Static task
static1
Behavioral task
behavioral1
Sample
32b416f3e7e0439190cce09408aa5582_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
32b416f3e7e0439190cce09408aa5582_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
32b416f3e7e0439190cce09408aa5582_JaffaCakes118.dll
-
Size
37KB
-
MD5
32b416f3e7e0439190cce09408aa5582
-
SHA1
2a97d5add15c236b61eda5f1f175717dc6e869c5
-
SHA256
1ac78ccf1ed6d87a1ed3640e60f6cdd69f10654c64f70570637e9227175b073f
-
SHA512
5ff5f7ad85e19b551bbb91b9f6e58848c21c710e6c60b8dfdbc8f79dbe3a702449bed9523946eb9fa216931f6fce98599d80fcba4190aa1124ab3b17fa222267
-
SSDEEP
768:OBvUOstEuG5UcO+k93pxT28LSSHZkbhxNeDQDSkKXG6gPoBZr:OBvUOv3AxT2gGPNeMDSVXgPoBZr
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2584 4016 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4644 wrote to memory of 4016 4644 rundll32.exe 83 PID 4644 wrote to memory of 4016 4644 rundll32.exe 83 PID 4644 wrote to memory of 4016 4644 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\32b416f3e7e0439190cce09408aa5582_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\32b416f3e7e0439190cce09408aa5582_JaffaCakes118.dll,#12⤵PID:4016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 6763⤵
- Program crash
PID:2584
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4016 -ip 40161⤵PID:1300