Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 10:30 UTC

General

  • Target

    73ac27c10765925ee22adfd1273126b7_JaffaCakes118.dll

  • Size

    24KB

  • MD5

    73ac27c10765925ee22adfd1273126b7

  • SHA1

    40197e148455409eca8a7c8ec03e1d6fdfa1b9ff

  • SHA256

    41369828fc31c0cb52b78a62663d01079f142600277d1691c66204525da692be

  • SHA512

    f6520a8fc13de5ef4ed096a1b139486749565d4f601ea6cdc2980a31c24e7447c982aae9ff98f80786e5f3434d84e851ac3bbc0e4c454102ceaf0de9b5962938

  • SSDEEP

    96:ukW6f+D9J8xTbwF2wuuUCcW8DwYgMtKRqKuVC0D5Mb+:Mq+BJ8xHwFvuuH+KaVVDu

Score
7/10

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\73ac27c10765925ee22adfd1273126b7_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\73ac27c10765925ee22adfd1273126b7_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1772

Network

  • flag-us
    DNS
    tt.ff88567.cn
    rundll32.exe
    Remote address:
    8.8.8.8:53
    Request
    tt.ff88567.cn
    IN A
    Response
No results found
  • 8.8.8.8:53
    tt.ff88567.cn
    dns
    rundll32.exe
    59 B
    112 B
    1
    1

    DNS Request

    tt.ff88567.cn

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1772-0-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.