Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 11:04
Static task
static1
Behavioral task
behavioral1
Sample
a689242e31382ec5155447a21992f1f9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a689242e31382ec5155447a21992f1f9_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a689242e31382ec5155447a21992f1f9_JaffaCakes118.dll
-
Size
28KB
-
MD5
a689242e31382ec5155447a21992f1f9
-
SHA1
064eefd265073b0337dbd311cfd250f5f2e2173e
-
SHA256
204c6c2e368f689ef2b0ee038bb07373eb0aaa094fd1e3870e8c8a61b99cd883
-
SHA512
c34d8c09e9780d7e78954a6e47804c9caac1220062996e7dc5f2fc1766a0ed7729dbfe622c6b940bdbc3a7e50a9a49ab4bda03166b8f46816f70c86ca9305a7e
-
SSDEEP
768:tikHl4xlgH0Gxpk1b1DP+BH/mIRkyBBmE3:tiI4xqEPEWAN3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3980 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2240 wrote to memory of 3980 2240 rundll32.exe 84 PID 2240 wrote to memory of 3980 2240 rundll32.exe 84 PID 2240 wrote to memory of 3980 2240 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a689242e31382ec5155447a21992f1f9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a689242e31382ec5155447a21992f1f9_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3980
-