Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 10:48
Static task
static1
Behavioral task
behavioral1
Sample
6f44436a73e94e245fb9b00cd4dadbcf_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6f44436a73e94e245fb9b00cd4dadbcf_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6f44436a73e94e245fb9b00cd4dadbcf_JaffaCakes118.dll
-
Size
34KB
-
MD5
6f44436a73e94e245fb9b00cd4dadbcf
-
SHA1
be2626a70cb1472dde018ae7f7fbc2dfecbb4139
-
SHA256
4c127d53e83dbc3d2219e8be776632bda221181f0a563f4cda1fdc5cf40a3c8c
-
SHA512
7e05249655cdb0af49521d324805fe7f239317ee5bb4ab978d05906a1aa4ab1c77a16c8050b3699328244606156790150169cc1b2370d6136adb83d0c4a5557f
-
SSDEEP
768:y7mRDL0cgngbMzSJOQc7S/DftqqhnP0RROGWN:imRD7gHzS0d7S/1pMRROGk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4368 wrote to memory of 2716 4368 rundll32.exe 84 PID 4368 wrote to memory of 2716 4368 rundll32.exe 84 PID 4368 wrote to memory of 2716 4368 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6f44436a73e94e245fb9b00cd4dadbcf_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6f44436a73e94e245fb9b00cd4dadbcf_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2716
-