Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 01:24
Static task
static1
Behavioral task
behavioral1
Sample
8280736c043f749ec69a4f3d9b30a5db_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8280736c043f749ec69a4f3d9b30a5db_JaffaCakes118.dll
Resource
win10v2004-20240730-en
General
-
Target
8280736c043f749ec69a4f3d9b30a5db_JaffaCakes118.dll
-
Size
614KB
-
MD5
8280736c043f749ec69a4f3d9b30a5db
-
SHA1
fa08cd0e933b58ffa5eb1f0802a4c7ed41915c16
-
SHA256
9f99067b65d4d06553d9166e976ccbfec3030abd1e4a2cf1d0b459cd172ec7eb
-
SHA512
fb87c5f301fd4253368f4be45495abd591db41b6a02cbd9feb862779bef821e476e299785b7d877ae8dd730f66d7ec346040d6b05d3c6d69e8829ca77a09277b
-
SSDEEP
12288:JRJ1lRszRj4jDuChvHWLCQN/DXElEj888888888888W888888888887M/xU7IFrI:BNKRjHCFWHN/D5VMq0sODv4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2780 2772 regsvr32.exe 30 PID 2772 wrote to memory of 2780 2772 regsvr32.exe 30 PID 2772 wrote to memory of 2780 2772 regsvr32.exe 30 PID 2772 wrote to memory of 2780 2772 regsvr32.exe 30 PID 2772 wrote to memory of 2780 2772 regsvr32.exe 30 PID 2772 wrote to memory of 2780 2772 regsvr32.exe 30 PID 2772 wrote to memory of 2780 2772 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\8280736c043f749ec69a4f3d9b30a5db_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\8280736c043f749ec69a4f3d9b30a5db_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:2780
-