Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
a560af0210323a31168d429d3119c537_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a560af0210323a31168d429d3119c537_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a560af0210323a31168d429d3119c537_JaffaCakes118.dll
-
Size
212KB
-
MD5
a560af0210323a31168d429d3119c537
-
SHA1
6eb2fdb03753ee11062c172d67bc00c3e9df24e7
-
SHA256
b65547d07b72348c6ac229b68c8d1589d8f1bb1f5e7b9ece582f63432af03554
-
SHA512
7df6dc8a405ac4b645229200a574b5116635b925dc4c5360d9dc15f2c72cf602775ce7c406bc175498ca8e041a01993a58eae4da05ade37accb41f7801c95197
-
SSDEEP
6144:syeD+mpa0pGaj2JgT5NuItvS7RGaJ/rgj7WpyN5PElXd:Xeimpa0pzjD9Icvy/67WpyNot
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\-115107-1986 rundll32.exe File created C:\Windows\SysWOW64\00c rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1988 wrote to memory of 4928 1988 rundll32.exe 86 PID 1988 wrote to memory of 4928 1988 rundll32.exe 86 PID 1988 wrote to memory of 4928 1988 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a560af0210323a31168d429d3119c537_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a560af0210323a31168d429d3119c537_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4928
-