Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 08:20
Static task
static1
Behavioral task
behavioral1
Sample
4d837fdefccbde0f99138d0abd4a8ef5_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4d837fdefccbde0f99138d0abd4a8ef5_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4d837fdefccbde0f99138d0abd4a8ef5_JaffaCakes118.dll
-
Size
92KB
-
MD5
4d837fdefccbde0f99138d0abd4a8ef5
-
SHA1
c4551215449923d8908c60491241b782f7c4c727
-
SHA256
103887bca257ef1ddbf850d5d8aa0389a6695335f6db8fd3826c86e9f6a24479
-
SHA512
034206f8a4adc357f17fa9f7a75db6e7140f51c3ca76a917d57630e2dcbf41793e60d9589f210518207b2a8e633db2c2afefc5e570d45feb24958e900e2f192a
-
SSDEEP
1536:uTtABR+KtDph3roHJnLh1+VsRk5nEMxToBwjPPhJse4:uTODVDbcHlLh1+V+kb9oBwDDs9
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2944 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2944 2884 rundll32.exe 30 PID 2884 wrote to memory of 2944 2884 rundll32.exe 30 PID 2884 wrote to memory of 2944 2884 rundll32.exe 30 PID 2884 wrote to memory of 2944 2884 rundll32.exe 30 PID 2884 wrote to memory of 2944 2884 rundll32.exe 30 PID 2884 wrote to memory of 2944 2884 rundll32.exe 30 PID 2884 wrote to memory of 2944 2884 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4d837fdefccbde0f99138d0abd4a8ef5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4d837fdefccbde0f99138d0abd4a8ef5_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:2944
-