Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 13:41
Behavioral task
behavioral1
Sample
41e8a81a3e0e07872224294c11c3f554_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
41e8a81a3e0e07872224294c11c3f554_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
41e8a81a3e0e07872224294c11c3f554_JaffaCakes118.dll
-
Size
88KB
-
MD5
41e8a81a3e0e07872224294c11c3f554
-
SHA1
2fa96105f48b58d8a03898b496d49164942813a3
-
SHA256
35fa2cd87d5cdb9a432895855828efa21167781484abcb4ba01b33323a7513bd
-
SHA512
09a429215bfe37aa46833c9b4f2b1a7b266512eb95bbda02f49324bf5cfcd053f2b30785f3ae230de282a022bc798fc12c3ed87ff8e5f03c1fb800fd004d9a1e
-
SSDEEP
1536:2ztGbVj12ITYh4uBbGU5A2uqQW9L+4PMmucoZqypxput1senUEhU3r3pX1nouy86:q4Vj12I0+QbwWh+qLoZhpxpursenF43p
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3308-0-0x0000000010000000-0x000000001002E000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1832 3308 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3328 wrote to memory of 3308 3328 rundll32.exe 82 PID 3328 wrote to memory of 3308 3328 rundll32.exe 82 PID 3328 wrote to memory of 3308 3328 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\41e8a81a3e0e07872224294c11c3f554_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\41e8a81a3e0e07872224294c11c3f554_JaffaCakes118.dll,#12⤵PID:3308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 5603⤵
- Program crash
PID:1832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3308 -ip 33081⤵PID:2588