Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
86d0a104e8ce80c3723867ea858cfa34_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
86d0a104e8ce80c3723867ea858cfa34_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
86d0a104e8ce80c3723867ea858cfa34_JaffaCakes118.dll
-
Size
56KB
-
MD5
86d0a104e8ce80c3723867ea858cfa34
-
SHA1
8537090a05edde91be83da8efb228ff067fce700
-
SHA256
9ec899b916e14e770bc1213e67753ad27dd167ef7f8d818ca12f70bcf9ebcd4d
-
SHA512
cb4f00f0ec605d63e9a09c60d9ac7a8adb8a9f62bf1e169523f6f5bb751d027e954d513558e34497815338dcc063b446552ce7b4898f65bc47931d33c77f2a07
-
SSDEEP
768:0CT+JdmoSwsseCA//AdLGdi8O1N8oTTzkYTxG5R:0CT+J4oSw3e4dLGdMcoHzof
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2256 1628 rundll32.exe 29 PID 1628 wrote to memory of 2256 1628 rundll32.exe 29 PID 1628 wrote to memory of 2256 1628 rundll32.exe 29 PID 1628 wrote to memory of 2256 1628 rundll32.exe 29 PID 1628 wrote to memory of 2256 1628 rundll32.exe 29 PID 1628 wrote to memory of 2256 1628 rundll32.exe 29 PID 1628 wrote to memory of 2256 1628 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\86d0a104e8ce80c3723867ea858cfa34_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\86d0a104e8ce80c3723867ea858cfa34_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2256
-