Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 05:58
Behavioral task
behavioral1
Sample
a9da58489822fc3db4d409c36bc7ae03_JaffaCakes118.dll
Resource
win7-20240729-en
3 signatures
150 seconds
General
-
Target
a9da58489822fc3db4d409c36bc7ae03_JaffaCakes118.dll
-
Size
67KB
-
MD5
a9da58489822fc3db4d409c36bc7ae03
-
SHA1
0b999f9f067fc0f5acc073d878f976345a88774d
-
SHA256
5d1ca8f894f428074f5d81f0b82cea5546e186a173d02428f3007a3a5fe26083
-
SHA512
5fcb470e044fad3a9d654bc359eaa69ee93b73292448a295cac70ff3337d4e6951eb0a6dfebf41a0ba1bd985a0ffa4993944e2d55641321b205870f66c00c5d6
-
SSDEEP
1536:kEsBAi6yVJbJ3JEHcBTfJgB7eLaoa6gX3+Rb+LUqw73p:kvBoyVz30IjuoaP3+RyUqU5
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4012-0-0x0000000010000000-0x000000001020E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 852 wrote to memory of 4012 852 rundll32.exe 84 PID 852 wrote to memory of 4012 852 rundll32.exe 84 PID 852 wrote to memory of 4012 852 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a9da58489822fc3db4d409c36bc7ae03_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a9da58489822fc3db4d409c36bc7ae03_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4012
-