Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 16:58
Behavioral task
behavioral1
Sample
39fc69e2bd58f8d478a6c783ead53091_JaffaCakes118.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
39fc69e2bd58f8d478a6c783ead53091_JaffaCakes118.dll
-
Size
98KB
-
MD5
39fc69e2bd58f8d478a6c783ead53091
-
SHA1
f9986b4c0fddfcefc3234d81071d3729e1d1f43e
-
SHA256
3632b647f4742b7ada5667d753b3936ec496f6025ef37331db7b8aabf3acd072
-
SHA512
6f8acb4f13700dab591efa7cd38b453ef505a1c4ed0fde089a3e701eed33b3aea9c5e1bf2b77aa5935b09cb06e50fb7d8d41a23939a85d5bac5ba2dcb5a56267
-
SSDEEP
1536:YETvxSvykVgmZ8SFswdU7gh9bVFrv1drRKC1c/CIfkCaJ/uTw3CP:YETvMakuSywvZx79KG8CykCaoTw3CP
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1312-0-0x0000000010000000-0x000000001001B000-memory.dmp family_gh0strat behavioral1/memory/1312-1-0x0000000010000000-0x000000001001B000-memory.dmp family_gh0strat -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1328 wrote to memory of 1312 1328 rundll32.exe 30 PID 1328 wrote to memory of 1312 1328 rundll32.exe 30 PID 1328 wrote to memory of 1312 1328 rundll32.exe 30 PID 1328 wrote to memory of 1312 1328 rundll32.exe 30 PID 1328 wrote to memory of 1312 1328 rundll32.exe 30 PID 1328 wrote to memory of 1312 1328 rundll32.exe 30 PID 1328 wrote to memory of 1312 1328 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39fc69e2bd58f8d478a6c783ead53091_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39fc69e2bd58f8d478a6c783ead53091_JaffaCakes118.dll,#12⤵PID:1312
-