Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
6fe0e220dfed91005cb986ceab889a40_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6fe0e220dfed91005cb986ceab889a40_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6fe0e220dfed91005cb986ceab889a40_JaffaCakes118.dll
-
Size
34KB
-
MD5
6fe0e220dfed91005cb986ceab889a40
-
SHA1
385e1acc71a6a8b7caf5a61ec65e175594eadf51
-
SHA256
3459b4bf611420b58fbdb56a194bd08dd284fc3dfdedc838c0c1eae5948278ae
-
SHA512
5697225e4074ecd065643f5654fa0d0669808bdc1e8b7a390e90191b65c67271e1ce61f3e3870e7a753776f675cb06056d25a6dec5c02b98979d6fe96d0b451b
-
SSDEEP
768:Ca8lahZqQdUpHvEPp6w7p/ANZm2OVORLKq9:Ca8cOpH8hb7p/AbfRLKq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4680 wrote to memory of 5044 4680 rundll32.exe 85 PID 4680 wrote to memory of 5044 4680 rundll32.exe 85 PID 4680 wrote to memory of 5044 4680 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6fe0e220dfed91005cb986ceab889a40_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6fe0e220dfed91005cb986ceab889a40_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5044
-