Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 18:50
Behavioral task
behavioral1
Sample
a7d0968744bd8a0116c6565bc9e30752_JaffaCakes118.dll
Resource
win7-20240704-en
4 signatures
150 seconds
General
-
Target
a7d0968744bd8a0116c6565bc9e30752_JaffaCakes118.dll
-
Size
506KB
-
MD5
a7d0968744bd8a0116c6565bc9e30752
-
SHA1
94aca1da41877fdcb14cd836abc2154c9db44b50
-
SHA256
b22aa03d621a15f9610fadefd97215ce0a24c8d1a7cc1c615014c4203572dc63
-
SHA512
fb81247f111e756e8fe4455be3456b4f022c659a92f53a6720221328a33ba6d14128427a74f259d4eebad2eae5f669ac064f55a28ca2c51ea0ae29c24c10bca1
-
SSDEEP
12288:0p+fAi6ECaNsWKNRwlmeAr8WnTA/lkLPpTD1PJZr:0pwU5/veArJnTA9Ev1RZr
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2968-0-0x00000000007D0000-0x000000000095F000-memory.dmp upx behavioral1/memory/2968-1-0x00000000007D0000-0x000000000095F000-memory.dmp upx behavioral1/memory/2968-4-0x00000000007D0000-0x000000000095F000-memory.dmp upx behavioral1/memory/2968-5-0x00000000007D0000-0x000000000095F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2968 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2968 2488 rundll32.exe 29 PID 2488 wrote to memory of 2968 2488 rundll32.exe 29 PID 2488 wrote to memory of 2968 2488 rundll32.exe 29 PID 2488 wrote to memory of 2968 2488 rundll32.exe 29 PID 2488 wrote to memory of 2968 2488 rundll32.exe 29 PID 2488 wrote to memory of 2968 2488 rundll32.exe 29 PID 2488 wrote to memory of 2968 2488 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7d0968744bd8a0116c6565bc9e30752_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7d0968744bd8a0116c6565bc9e30752_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2968
-