Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 14:49
Behavioral task
behavioral1
Sample
70098450108be960b9f73cf9fd41ae7f_JaffaCakes118.dll
Resource
win7-20240705-en
3 signatures
150 seconds
General
-
Target
70098450108be960b9f73cf9fd41ae7f_JaffaCakes118.dll
-
Size
75KB
-
MD5
70098450108be960b9f73cf9fd41ae7f
-
SHA1
d0eb2a1406c28796189d7618675d7c0f5bd26f98
-
SHA256
9ff7ca9a67f219477365bc0851e3c6317c02952dad86082572940ba0eee2f8d7
-
SHA512
af40beb82748bfe8ae1d310fb73a5c1c8e384a4a0e4b6b83fce8c7be1834be4ab7146bd6b1b8a9610de078c578c2e141a5b2dfd91bbf773437443d15fa425f1e
-
SSDEEP
1536:1zExMwCGQ2jQJ85yCcphFzacEOyNTtXTCXQ:1I+wCGvUJ85WscfcxCXQ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1640-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2332 wrote to memory of 1640 2332 rundll32.exe 84 PID 2332 wrote to memory of 1640 2332 rundll32.exe 84 PID 2332 wrote to memory of 1640 2332 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\70098450108be960b9f73cf9fd41ae7f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\70098450108be960b9f73cf9fd41ae7f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1640
-