Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
8b0b0232282ff137fbb0becdc2150b4b_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8b0b0232282ff137fbb0becdc2150b4b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8b0b0232282ff137fbb0becdc2150b4b_JaffaCakes118.dll
-
Size
2.1MB
-
MD5
8b0b0232282ff137fbb0becdc2150b4b
-
SHA1
fd7d1b9dad59ce591a88862f8f52a95da60b331d
-
SHA256
6c750629a7ac0f692ca0841181854e19d4f5fbfb747ade79e405ffe60e80cc21
-
SHA512
135d811142b4388e8c5bdbc7c06a3ed9256b0220607203672a20129f98407b2304b1237259440a31cb2269538788179f66edac46549e5ba6f7e0ab3f15c9198c
-
SSDEEP
49152:vuHCGeQCAqXoZWHHAz+Sx+WysjwCgOJ/j/nA8smT47+7FiB+J:YCVQ42+SMWNxJ7/nATC4K7XJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4372 wrote to memory of 1056 4372 rundll32.exe 83 PID 4372 wrote to memory of 1056 4372 rundll32.exe 83 PID 4372 wrote to memory of 1056 4372 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b0b0232282ff137fbb0becdc2150b4b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b0b0232282ff137fbb0becdc2150b4b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1056
-