Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 19:02
Behavioral task
behavioral1
Sample
94584cd4e651ef2b8616af1e5f61bbc6_JaffaCakes118.dll
Resource
win7-20240704-en
3 signatures
150 seconds
General
-
Target
94584cd4e651ef2b8616af1e5f61bbc6_JaffaCakes118.dll
-
Size
55KB
-
MD5
94584cd4e651ef2b8616af1e5f61bbc6
-
SHA1
6846a5f48f39c22531caa0e0922c9fbb10b27502
-
SHA256
26cc2c372afc8b188ff92ebc8e345f63729e12ec79b56a4e29b5489e542a47b8
-
SHA512
6e7305b40cbf4825ba1041fb21513a62887eae559f7284590ff6ad298ede79da03aa26a9f885f4f9b42382cabb98400b3200a12424b4ec8771509b6b4d2e2e5a
-
SSDEEP
768:qz6nzm1b5gNZLLrJAH3/bg+vmzme/Nn7p5j8QIvwOcw+8uTyhpddNptkRZq8qdcd:qmmMhAzJvM1XIvQ7ry7LNXmdI0
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4248-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1356 wrote to memory of 4248 1356 rundll32.exe 83 PID 1356 wrote to memory of 4248 1356 rundll32.exe 83 PID 1356 wrote to memory of 4248 1356 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\94584cd4e651ef2b8616af1e5f61bbc6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\94584cd4e651ef2b8616af1e5f61bbc6_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4248
-