Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/08/2024, 23:02
Static task
static1
Behavioral task
behavioral1
Sample
83e6c2352383aac26ed1dfe41124c52c_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
83e6c2352383aac26ed1dfe41124c52c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
83e6c2352383aac26ed1dfe41124c52c_JaffaCakes118.dll
-
Size
508KB
-
MD5
83e6c2352383aac26ed1dfe41124c52c
-
SHA1
b4d47bfbfe5eb39c1ae326c2db7f263b6efea095
-
SHA256
95a5bcfa7995bba32a79c24d2c650b609471dfb986de8a4a4c749578f8cc8417
-
SHA512
79a08ffba858355a7dec9693995350782888b9f59f3898dcba791dbded234818738d968218e9500437ad63979270455227f26622507cc0b97259cc6d7e7085c8
-
SSDEEP
12288:SfVHjfuHQNW1sIL7c5WwYuNo4QTpFOHnGzO/q:ODfOQNWKIL7c5F+dFBzX
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2888 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2888 1508 rundll32.exe 30 PID 1508 wrote to memory of 2888 1508 rundll32.exe 30 PID 1508 wrote to memory of 2888 1508 rundll32.exe 30 PID 1508 wrote to memory of 2888 1508 rundll32.exe 30 PID 1508 wrote to memory of 2888 1508 rundll32.exe 30 PID 1508 wrote to memory of 2888 1508 rundll32.exe 30 PID 1508 wrote to memory of 2888 1508 rundll32.exe 30 PID 2888 wrote to memory of 2528 2888 rundll32.exe 31 PID 2888 wrote to memory of 2528 2888 rundll32.exe 31 PID 2888 wrote to memory of 2528 2888 rundll32.exe 31 PID 2888 wrote to memory of 2528 2888 rundll32.exe 31 PID 2888 wrote to memory of 2528 2888 rundll32.exe 31 PID 2888 wrote to memory of 2528 2888 rundll32.exe 31 PID 2888 wrote to memory of 2528 2888 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\83e6c2352383aac26ed1dfe41124c52c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\83e6c2352383aac26ed1dfe41124c52c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" 23⤵
- System Location Discovery: System Language Discovery
PID:2528
-
-