Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
3751ace32ef2721f9143e04ef2018483_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3751ace32ef2721f9143e04ef2018483_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3751ace32ef2721f9143e04ef2018483_JaffaCakes118.dll
-
Size
9KB
-
MD5
3751ace32ef2721f9143e04ef2018483
-
SHA1
f046c68e486676530136c27c8c49c6f44a69f774
-
SHA256
cb2d9c0cea7ad753c655d6a1867a0cb9da08dd86dd10b25688dc4fbe11cbf617
-
SHA512
125cbcaa4c10b6e7c21b180f1a376a74d0d3f95e930cfa2d09004151f7f3f3c62881fb58d3adf6ba93ffa70d83203e474dae0a349c9828c932e958d65feab163
-
SSDEEP
192:g7QTqOhrA/qp6N2wBFg6RuAignGmr+jOSg:gsTqOhrAE6NXM6Rd9K+
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4704 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\system.exe" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4704 rundll32.exe 4704 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2356 wrote to memory of 4704 2356 rundll32.exe 83 PID 2356 wrote to memory of 4704 2356 rundll32.exe 83 PID 2356 wrote to memory of 4704 2356 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3751ace32ef2721f9143e04ef2018483_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3751ace32ef2721f9143e04ef2018483_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD56c7cdd25c2cb0073306eb22aebfc663f
SHA1a1eba8ab49272b9852fe6a543677e8af36271248
SHA25658280e3572333f97a7cf9f33e8d31dc26a98b6535965ebd0bde82249fc9bf705
SHA51217344e07b9e9b2cd6ae4237d7f310732462f9cbb8656883607d7a1a4090e869265f92a6da1718dee50b1375b91583de60c6bd9e7e8db6b6e45e33f4b894365d6