Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
a7ffe842a76238c10d759e21640edee9_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a7ffe842a76238c10d759e21640edee9_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a7ffe842a76238c10d759e21640edee9_JaffaCakes118.dll
-
Size
231KB
-
MD5
a7ffe842a76238c10d759e21640edee9
-
SHA1
2d39c49315fe6892e2703ffccef0ad2711ad758f
-
SHA256
f34dceb4a8c5ec6e5f67bccb2cd2dac869b61195181ee2df7031aff07de3f8ef
-
SHA512
8fed462616a2746fbec7cc29f0949d3bc8717ce74d6fe4e469b7f52f06af7e38303fa2337d8208fdf1d1a3872bed81653bb4ab820e8bd732a24dfa768e49e6c9
-
SSDEEP
6144:qFIjqTVXbmJHTkEEE3or9wz5+DMDVPJYiFUK9u2t6f:qCjqxrmZTrL3oCXPNQ2t6f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 464 wrote to memory of 4856 464 rundll32.exe 84 PID 464 wrote to memory of 4856 464 rundll32.exe 84 PID 464 wrote to memory of 4856 464 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7ffe842a76238c10d759e21640edee9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7ffe842a76238c10d759e21640edee9_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4856
-