Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 23:07
Behavioral task
behavioral1
Sample
472d076d75b12b42527a29e4e5596a4f_JaffaCakes118.dll
Resource
win7-20240704-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
472d076d75b12b42527a29e4e5596a4f_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
472d076d75b12b42527a29e4e5596a4f_JaffaCakes118.dll
-
Size
56KB
-
MD5
472d076d75b12b42527a29e4e5596a4f
-
SHA1
3608fe6b147f9e654476d37aad249c1870581be1
-
SHA256
3a455da863a0066e6a270df6d5f37e044616174dd99156c2afc4666d18f91758
-
SHA512
9405ff6a84c38c9132db5b2275a641e718004174f0d56bff0271b65445917cc9b11e624241487bcbc634f1415507bd1f10e9b0b8ead216a6c78ccaac44968460
-
SSDEEP
1536:uaqqc/mgR2+wuUzLLcUEXfSeClB2pvuiCIb:ufqc/J2JzLLcUEqPQpvuE
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3024-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1968 wrote to memory of 3024 1968 rundll32.exe 30 PID 1968 wrote to memory of 3024 1968 rundll32.exe 30 PID 1968 wrote to memory of 3024 1968 rundll32.exe 30 PID 1968 wrote to memory of 3024 1968 rundll32.exe 30 PID 1968 wrote to memory of 3024 1968 rundll32.exe 30 PID 1968 wrote to memory of 3024 1968 rundll32.exe 30 PID 1968 wrote to memory of 3024 1968 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\472d076d75b12b42527a29e4e5596a4f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\472d076d75b12b42527a29e4e5596a4f_JaffaCakes118.dll,#12⤵PID:3024
-