Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
3e26bddbf15950620e0e9891854cfce6_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3e26bddbf15950620e0e9891854cfce6_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3e26bddbf15950620e0e9891854cfce6_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
3e26bddbf15950620e0e9891854cfce6
-
SHA1
57909acc4e39fd61ff4cf29173325d1493baa089
-
SHA256
db58d343efbf99c39999f4c7e3d16217cab3dc664c6d81d2216d34de112eed73
-
SHA512
20dac6324b017ba80e265909d181cde8bee64963377fe95dfe492996563085b3cd917a300a913af1363a7438a71a01e0708b919aa6146848cb20e904329e597d
-
SSDEEP
24576:BLW2JwUk2S6M8QjQPlGQl7vuXKC2/Nbb9hhXUdjL4U:BK2J42S68je0YvuXKPlbBhxMv
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3400 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4296 wrote to memory of 3400 4296 rundll32.exe 83 PID 4296 wrote to memory of 3400 4296 rundll32.exe 83 PID 4296 wrote to memory of 3400 4296 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e26bddbf15950620e0e9891854cfce6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e26bddbf15950620e0e9891854cfce6_JaffaCakes118.dll,#12⤵
- Checks BIOS information in registry
- Suspicious use of SetWindowsHookEx
PID:3400
-