Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 16:58
Behavioral task
behavioral1
Sample
39fc69e2bd58f8d478a6c783ead53091_JaffaCakes118.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
39fc69e2bd58f8d478a6c783ead53091_JaffaCakes118.dll
-
Size
98KB
-
MD5
39fc69e2bd58f8d478a6c783ead53091
-
SHA1
f9986b4c0fddfcefc3234d81071d3729e1d1f43e
-
SHA256
3632b647f4742b7ada5667d753b3936ec496f6025ef37331db7b8aabf3acd072
-
SHA512
6f8acb4f13700dab591efa7cd38b453ef505a1c4ed0fde089a3e701eed33b3aea9c5e1bf2b77aa5935b09cb06e50fb7d8d41a23939a85d5bac5ba2dcb5a56267
-
SSDEEP
1536:YETvxSvykVgmZ8SFswdU7gh9bVFrv1drRKC1c/CIfkCaJ/uTw3CP:YETvMakuSywvZx79KG8CykCaoTw3CP
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/400-0-0x0000000010000000-0x000000001001B000-memory.dmp family_gh0strat -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1044 wrote to memory of 400 1044 rundll32.exe 83 PID 1044 wrote to memory of 400 1044 rundll32.exe 83 PID 1044 wrote to memory of 400 1044 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39fc69e2bd58f8d478a6c783ead53091_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39fc69e2bd58f8d478a6c783ead53091_JaffaCakes118.dll,#12⤵PID:400
-