Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 02:03
Behavioral task
behavioral1
Sample
829f9f129e89a5fb5052eed097498c70_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
829f9f129e89a5fb5052eed097498c70_JaffaCakes118.dll
Resource
win10v2004-20240730-en
General
-
Target
829f9f129e89a5fb5052eed097498c70_JaffaCakes118.dll
-
Size
161KB
-
MD5
829f9f129e89a5fb5052eed097498c70
-
SHA1
3b42d9798ae324bcde554cc0efb05f98262fd428
-
SHA256
2108b2a1f7b7605c64d2ad79eb0f3fcafd3415c7e8c8842bedc4841da1e800e3
-
SHA512
6edd4224ee8c0a02cd829a16a50013fa3aacff51e10ad52b22dadf13e8a2ea45c6e49652311e2f25b63774fc7da29c7c9f990778ce7e2e92ce2f92f3ae931191
-
SSDEEP
3072:PZFkmvfYfe96HM0XU+aDembri59tuvdZhhL/H0XpmT9X+pf/GPj6VQu68W/:hbXYWn+aCP0vdZhhL0MT0pf/qUQz/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1384 wrote to memory of 3300 1384 rundll32.exe 83 PID 1384 wrote to memory of 3300 1384 rundll32.exe 83 PID 1384 wrote to memory of 3300 1384 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\829f9f129e89a5fb5052eed097498c70_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\829f9f129e89a5fb5052eed097498c70_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3300
-