Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 23:07
Behavioral task
behavioral1
Sample
472d076d75b12b42527a29e4e5596a4f_JaffaCakes118.dll
Resource
win7-20240704-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
472d076d75b12b42527a29e4e5596a4f_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
472d076d75b12b42527a29e4e5596a4f_JaffaCakes118.dll
-
Size
56KB
-
MD5
472d076d75b12b42527a29e4e5596a4f
-
SHA1
3608fe6b147f9e654476d37aad249c1870581be1
-
SHA256
3a455da863a0066e6a270df6d5f37e044616174dd99156c2afc4666d18f91758
-
SHA512
9405ff6a84c38c9132db5b2275a641e718004174f0d56bff0271b65445917cc9b11e624241487bcbc634f1415507bd1f10e9b0b8ead216a6c78ccaac44968460
-
SSDEEP
1536:uaqqc/mgR2+wuUzLLcUEXfSeClB2pvuiCIb:ufqc/J2JzLLcUEqPQpvuE
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/116-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2180 wrote to memory of 116 2180 rundll32.exe 83 PID 2180 wrote to memory of 116 2180 rundll32.exe 83 PID 2180 wrote to memory of 116 2180 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\472d076d75b12b42527a29e4e5596a4f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\472d076d75b12b42527a29e4e5596a4f_JaffaCakes118.dll,#12⤵PID:116
-