Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
7478719f2aa3b5870c7427b79a363dc4_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7478719f2aa3b5870c7427b79a363dc4_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
7478719f2aa3b5870c7427b79a363dc4_JaffaCakes118.dll
-
Size
4KB
-
MD5
7478719f2aa3b5870c7427b79a363dc4
-
SHA1
3efc45bbe5ab3a945091f0962fe405bef07c4b30
-
SHA256
8b91c1bedf37b65ae9efedcce004507071db2a97c01ff48ce2afaa2069f9c9d8
-
SHA512
e3019cb555913f83bc665fc835e05a711b3540e12001de5638dec414678a7f05bdfadc2e523f74932d00f2bc431ea83cc058854b6181fcedc0288b1917751c7c
-
SSDEEP
96:2jgBHV5TL/cOxEj/NgPYcynEqLxNy3M0:2jwHvTrOeAkqLb0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2372 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2372 1244 rundll32.exe 30 PID 1244 wrote to memory of 2372 1244 rundll32.exe 30 PID 1244 wrote to memory of 2372 1244 rundll32.exe 30 PID 1244 wrote to memory of 2372 1244 rundll32.exe 30 PID 1244 wrote to memory of 2372 1244 rundll32.exe 30 PID 1244 wrote to memory of 2372 1244 rundll32.exe 30 PID 1244 wrote to memory of 2372 1244 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7478719f2aa3b5870c7427b79a363dc4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7478719f2aa3b5870c7427b79a363dc4_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2372
-