Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 12:49

General

  • Target

    e037eb5a4c6a0ea07f07896138c0b588_JaffaCakes118.dll

  • Size

    840KB

  • MD5

    e037eb5a4c6a0ea07f07896138c0b588

  • SHA1

    4f8bf7e873780ff819a61a6328cb904d6c23e33b

  • SHA256

    28e0294d28e5ee14afb3531d0678ee40ec682e39c6574ac71ebe12514123a65c

  • SHA512

    2694b7874f873d5ffe03e7c57e9078f47a660afb445516b341896a1e7fa4eb6dd4f73d9046d7a71f6bea6cfdad19ebd4d07599bb338a53d883479acb4d28313b

  • SSDEEP

    24576:9KU6GmyoRYWILtjRi0x5ll0nwZwzSuy0j2jt:Y9/IL3i0x5snwZwzSJ0jW

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e037eb5a4c6a0ea07f07896138c0b588_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\e037eb5a4c6a0ea07f07896138c0b588_JaffaCakes118.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of SetWindowsHookEx
      PID:1480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1480-0-0x0000000000400000-0x000000000064E000-memory.dmp

    Filesize

    2.3MB

  • memory/1480-21-0x0000000000400000-0x000000000064E000-memory.dmp

    Filesize

    2.3MB