Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
ab50c532712f0c7bb2b46196e8f1b2f0_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ab50c532712f0c7bb2b46196e8f1b2f0_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ab50c532712f0c7bb2b46196e8f1b2f0_JaffaCakes118.dll
-
Size
56KB
-
MD5
ab50c532712f0c7bb2b46196e8f1b2f0
-
SHA1
6ab516883f5927a9b57628c3c322e26672e73a16
-
SHA256
166d1f31766a8f9dc1f42c9126984e4f99d05a8957bc2312ed99f0c75916a511
-
SHA512
76664bb70dec68e8b2ef726f5dd6769bfbf605e92d47210a787ea519fca157608c91cbb0f5c40d858fe3ca25096991a3deba972850d3362d17bdf56c33932662
-
SSDEEP
1536:1+ItLQAg0Y+WiABVQohIpNhqCdP84iODD7a8CTb:7tQAm+WiABeohIpNnva8CTb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1300 wrote to memory of 1960 1300 rundll32.exe 84 PID 1300 wrote to memory of 1960 1300 rundll32.exe 84 PID 1300 wrote to memory of 1960 1300 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ab50c532712f0c7bb2b46196e8f1b2f0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ab50c532712f0c7bb2b46196e8f1b2f0_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1960
-