Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 02:33
Behavioral task
behavioral1
Sample
ad90a0b30c479ef1df168c6def1d6869_JaffaCakes118.dll
Resource
win7-20240705-en
3 signatures
150 seconds
General
-
Target
ad90a0b30c479ef1df168c6def1d6869_JaffaCakes118.dll
-
Size
47KB
-
MD5
ad90a0b30c479ef1df168c6def1d6869
-
SHA1
f631cb0bd4141f6a0e7eb8675fbbf1817bf0ac11
-
SHA256
c922970431142c10891759a820f7043cb0fdd87362d6b9aefd4d69a22eb5be43
-
SHA512
f4030090fa23ac882d18c02048e8beb1feaf1a33b544fb3f5e28a9c0517f02da3c626482d2978e855bc22a2220f06646c8f7fafa46f62a29e314151545bba22e
-
SSDEEP
768:wX7l2i4+6WhcbSiaZfePO9KOK8THjX0Vn8ZWd0p9T3j3aRF/+OlM9cEbjyJ0ZxzK:wXx6VYT8rKHjX0ViWd0p9H8l+OK99jnE
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4992-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3732 wrote to memory of 4992 3732 rundll32.exe 93 PID 3732 wrote to memory of 4992 3732 rundll32.exe 93 PID 3732 wrote to memory of 4992 3732 rundll32.exe 93
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad90a0b30c479ef1df168c6def1d6869_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad90a0b30c479ef1df168c6def1d6869_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4292,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=4432 /prefetch:81⤵PID:1488