Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 20:15
Behavioral task
behavioral1
Sample
8783a613436061e3cb943a76d2e88fa6_JaffaCakes118.dll
Resource
win7-20240708-en
2 signatures
150 seconds
General
-
Target
8783a613436061e3cb943a76d2e88fa6_JaffaCakes118.dll
-
Size
101KB
-
MD5
8783a613436061e3cb943a76d2e88fa6
-
SHA1
8b467c441b49d3b6e8331a862ca141460e99bd53
-
SHA256
359b07df32d08da50eb03b15a0fb430d4e781271fef8e55699c7e331c0a07178
-
SHA512
fbb8359ee050c29baf2a6d0f862e990d2f8ae11f8e5e9545bd2894621d6f5edb15e6939ea73ce185838b4cc5d5daf7ae618d784fd81d754d1158d3faa6ff05f0
-
SSDEEP
1536:TD6K271gp7DXHQ49AsI/KeXAJqQ2P6QAWBpr2UX9dOphd:TDGYLwweKeXNZPJDpxdOF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1216-0-0x0000000010000000-0x000000001000F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1216 2340 rundll32.exe 86 PID 2340 wrote to memory of 1216 2340 rundll32.exe 86 PID 2340 wrote to memory of 1216 2340 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8783a613436061e3cb943a76d2e88fa6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8783a613436061e3cb943a76d2e88fa6_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1216
-