Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
17s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
9731ce7b5966d7a6d552a808c7627a52_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9731ce7b5966d7a6d552a808c7627a52_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
9731ce7b5966d7a6d552a808c7627a52_JaffaCakes118.dll
-
Size
132KB
-
MD5
9731ce7b5966d7a6d552a808c7627a52
-
SHA1
d61985f19dcbd996b7aa75db2a55a16ffd8dc739
-
SHA256
60096805005cb26820fa6cc76a49245e0c12d2b0abc7c935d3b275d742fb85f1
-
SHA512
b49cd0a6c766206efbe6565b21c1e3ac50a119ca1b371c878305edafec5834d142c60dfdb79d90e148e7e7c2263794c1fe981f1db29ecc5a10cfaa3294c6daf1
-
SSDEEP
1536:wZA1m1T0TDAdgpvGp+kHruGf3FS8hoU1LPcw5fV7sN3ZuHssMCLaefqsZWcV7ap:x1m1TwkCGdBD1d56BIssMFWqsZWclg
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2260 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2260 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2260 2228 rundll32.exe 29 PID 2228 wrote to memory of 2260 2228 rundll32.exe 29 PID 2228 wrote to memory of 2260 2228 rundll32.exe 29 PID 2228 wrote to memory of 2260 2228 rundll32.exe 29 PID 2228 wrote to memory of 2260 2228 rundll32.exe 29 PID 2228 wrote to memory of 2260 2228 rundll32.exe 29 PID 2228 wrote to memory of 2260 2228 rundll32.exe 29 PID 2260 wrote to memory of 692 2260 rundll32.exe 30 PID 2260 wrote to memory of 692 2260 rundll32.exe 30 PID 2260 wrote to memory of 692 2260 rundll32.exe 30 PID 2260 wrote to memory of 692 2260 rundll32.exe 30 PID 692 wrote to memory of 1268 692 net.exe 32 PID 692 wrote to memory of 1268 692 net.exe 32 PID 692 wrote to memory of 1268 692 net.exe 32 PID 692 wrote to memory of 1268 692 net.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9731ce7b5966d7a6d552a808c7627a52_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9731ce7b5966d7a6d552a808c7627a52_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:1268
-
-
-