Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
94d5faf1e50195be7abdd42614186496_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
94d5faf1e50195be7abdd42614186496_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
94d5faf1e50195be7abdd42614186496_JaffaCakes118.dll
-
Size
5KB
-
MD5
94d5faf1e50195be7abdd42614186496
-
SHA1
bad547cb273805fb48118caa8de2296f40e4d055
-
SHA256
bd6105e0c3cf19f9c2f40679865d56221478fd73f5d90e2aabf88bf4dc0c3cc9
-
SHA512
b2b2d8696b7f5a47fa4e6bfd005d0a7bba9438bfc1ee3dd7ad84da3ce4eb5f7b2b7b3589fc699caaf072bf385bbb8571a52b9ac8af3e16d48dbc7ffd01b82ab8
-
SSDEEP
96:R7Di6iiGIaXowjJj8KE7milmQ1k6GsvvV0DB5UVMecBRFO9VLdCNKBH:R7+a1eSK+VSDcmFRFoCe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4664 wrote to memory of 4956 4664 rundll32.exe 91 PID 4664 wrote to memory of 4956 4664 rundll32.exe 91 PID 4664 wrote to memory of 4956 4664 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\94d5faf1e50195be7abdd42614186496_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\94d5faf1e50195be7abdd42614186496_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3852,i,15436195446242760253,4000484513008731869,262144 --variations-seed-version --mojo-platform-channel-handle=4244 /prefetch:81⤵PID:2104