Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 16:15
Static task
static1
Behavioral task
behavioral1
Sample
abb29f838ba1422e5a2657cfaf960db4_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
abb29f838ba1422e5a2657cfaf960db4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
abb29f838ba1422e5a2657cfaf960db4_JaffaCakes118.dll
-
Size
18KB
-
MD5
abb29f838ba1422e5a2657cfaf960db4
-
SHA1
6abbc73afcfd825b56724e09351a3050bfb11fe4
-
SHA256
3b2071ec8c7a674eafea4257e65ae9996e7e3e9b3bcd8059d16117faa2312d37
-
SHA512
f7fd5b1c4cda4eca8730b06012478a1dfef474f0dcd9de4b834f1606f266a8128433c7a1c91f1aee2b2b6e1b571fe5a6e596205fa8395625170a23335d8bd958
-
SSDEEP
384:KaQy4lYnxPoEl5dHURyElJkeXo/5aBHxd1wQ6na9fuIwm6hjlOax498gW:Ah1o/5OHD1v6na9Glm63OauSn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1868 2080 rundll32.exe 30 PID 2080 wrote to memory of 1868 2080 rundll32.exe 30 PID 2080 wrote to memory of 1868 2080 rundll32.exe 30 PID 2080 wrote to memory of 1868 2080 rundll32.exe 30 PID 2080 wrote to memory of 1868 2080 rundll32.exe 30 PID 2080 wrote to memory of 1868 2080 rundll32.exe 30 PID 2080 wrote to memory of 1868 2080 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\abb29f838ba1422e5a2657cfaf960db4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\abb29f838ba1422e5a2657cfaf960db4_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1868
-