Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 07:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7330f5d6df0de6a65422948b0f1d5b0f_JaffaCakes118.dll
Resource
win7-20240705-en
3 signatures
150 seconds
General
-
Target
7330f5d6df0de6a65422948b0f1d5b0f_JaffaCakes118.dll
-
Size
124KB
-
MD5
7330f5d6df0de6a65422948b0f1d5b0f
-
SHA1
aeafe1e491526184915763de9ee9fa647f388f4f
-
SHA256
31dadcfc38356089faac8a43c25a4647022daf6ac2b708742b5dca9fc1a6f129
-
SHA512
c376cd450bb1588749b959ff90d84be4ba8075c8dc5ba07beee17fd48edbc9ae9d9d3a6dd608c2a68b8dec0fbdde4800cfdf03dfc742e96cbaf33341734d3d6c
-
SSDEEP
3072:EkgHeBglvBIccuccLiqQnKkszaQ6PTXRB5:EkgHeBglpt9ccLfCKpaVbj5
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2516-1-0x0000000000240000-0x000000000028D000-memory.dmp upx behavioral1/memory/2516-2-0x0000000000240000-0x000000000028D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2516 2156 rundll32.exe 30 PID 2156 wrote to memory of 2516 2156 rundll32.exe 30 PID 2156 wrote to memory of 2516 2156 rundll32.exe 30 PID 2156 wrote to memory of 2516 2156 rundll32.exe 30 PID 2156 wrote to memory of 2516 2156 rundll32.exe 30 PID 2156 wrote to memory of 2516 2156 rundll32.exe 30 PID 2156 wrote to memory of 2516 2156 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7330f5d6df0de6a65422948b0f1d5b0f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7330f5d6df0de6a65422948b0f1d5b0f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2516
-