Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 01:02
Behavioral task
behavioral1
Sample
71fd9b3fb30bb7d2889f478b6dd304c6_JaffaCakes118.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
71fd9b3fb30bb7d2889f478b6dd304c6_JaffaCakes118.dll
-
Size
66KB
-
MD5
71fd9b3fb30bb7d2889f478b6dd304c6
-
SHA1
cf4577b0be1daf574106eb4037e5ce4d5602997c
-
SHA256
2603030c4a646637985c3156db772c8f15cf57307ecb0aa1eaa7f1e3d525f9b7
-
SHA512
eae1a2540cb2797c61cc5ad028d8ac5840db6a48dc4a45f9dad163465dcfe1922430af37fe5171bfa5d9343b1e928e581a412ddd84c884f3e5e8315697f4a9ce
-
SSDEEP
1536:YJEu0nVKn6Xd/iPEXBQWnm3EihVinwu0nFkDTOxTjI:YmJnVKn6tdGt7hu0FkDTOZ0
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/892-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 940 wrote to memory of 892 940 rundll32.exe 84 PID 940 wrote to memory of 892 940 rundll32.exe 84 PID 940 wrote to memory of 892 940 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\71fd9b3fb30bb7d2889f478b6dd304c6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\71fd9b3fb30bb7d2889f478b6dd304c6_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:892
-