Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 12:48
Static task
static1
Behavioral task
behavioral1
Sample
6fa37b9b730e1792712d3e844d1a9194_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6fa37b9b730e1792712d3e844d1a9194_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6fa37b9b730e1792712d3e844d1a9194_JaffaCakes118.dll
-
Size
168KB
-
MD5
6fa37b9b730e1792712d3e844d1a9194
-
SHA1
6873abf442476eeb109e65f65e6a8845715be4ec
-
SHA256
a0ed792a621b86af91bb2b9ca71da5e43fc7977eb818ac7286cb122ec7f6b04c
-
SHA512
f26b67bca08681f9cd312c3b32259398001a0868c4108349efb12a36970d2834d89142a1b48966ddc46eb797718cad07452a8bde075fd6f4fb1e0e1e904180ba
-
SSDEEP
3072:Z7hSigR2CN6L0BsJYWYAaLaymMXaRpCjRe:iigNk0BsVY7KDCjg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2288 1668 rundll32.exe 30 PID 1668 wrote to memory of 2288 1668 rundll32.exe 30 PID 1668 wrote to memory of 2288 1668 rundll32.exe 30 PID 1668 wrote to memory of 2288 1668 rundll32.exe 30 PID 1668 wrote to memory of 2288 1668 rundll32.exe 30 PID 1668 wrote to memory of 2288 1668 rundll32.exe 30 PID 1668 wrote to memory of 2288 1668 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6fa37b9b730e1792712d3e844d1a9194_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6fa37b9b730e1792712d3e844d1a9194_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2288
-