Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/08/2024, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
81c05bcfec0fc8a84a49a5741ac8f2bd_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
81c05bcfec0fc8a84a49a5741ac8f2bd_JaffaCakes118.dll
Resource
win10v2004-20240730-en
General
-
Target
81c05bcfec0fc8a84a49a5741ac8f2bd_JaffaCakes118.dll
-
Size
72KB
-
MD5
81c05bcfec0fc8a84a49a5741ac8f2bd
-
SHA1
8df769631c4e47a03f352f244d123a5caf869fe4
-
SHA256
757f7365cb902bcc3f03b845e2bfed24f6966957386b893d5f75edf763f07bab
-
SHA512
3e6429f79b1f2c2a9f5731be4f40e6d775ccbfc7c8fde48fee1a23d19cf1ff9f50e4cfe83fdd8194d0fcb367bf35a93cc0dbf9897ff7e7cf25f40b69f6fbbac7
-
SSDEEP
1536:Sjjl3nwzSuOqBubw/WgT6zMKAOK2lCWcQajhRuP:C5UOq0ukgOK2l7aFQP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1996 1940 rundll32.exe 30 PID 1940 wrote to memory of 1996 1940 rundll32.exe 30 PID 1940 wrote to memory of 1996 1940 rundll32.exe 30 PID 1940 wrote to memory of 1996 1940 rundll32.exe 30 PID 1940 wrote to memory of 1996 1940 rundll32.exe 30 PID 1940 wrote to memory of 1996 1940 rundll32.exe 30 PID 1940 wrote to memory of 1996 1940 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81c05bcfec0fc8a84a49a5741ac8f2bd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81c05bcfec0fc8a84a49a5741ac8f2bd_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1996
-