Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
af82ecac17a4b9d47cbc12604e9ec4b5_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
af82ecac17a4b9d47cbc12604e9ec4b5_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
af82ecac17a4b9d47cbc12604e9ec4b5_JaffaCakes118.dll
-
Size
158KB
-
MD5
af82ecac17a4b9d47cbc12604e9ec4b5
-
SHA1
22855b2d0dc5083cc841cf53e4b3b405fc8b8e16
-
SHA256
95545a9a33e060e3643ddb1a35e7ee974d0b364f98478ef32eaf6799c3b1941b
-
SHA512
9b927649370eb42e02749ddc0cc4039398f1aa1daa4e648e7536803372064bd0760cff9b74ebd20abee252f595d4dc10422422853f4ab674c4512a32fb435918
-
SSDEEP
3072:5qMY8TznEvF0wN6+t0mQrq0HlnNNAQSMFfI0Yv0w:5qMY8TzEviwN6+PYHTNJSM9jYsw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2084 2176 regsvr32.exe 30 PID 2176 wrote to memory of 2084 2176 regsvr32.exe 30 PID 2176 wrote to memory of 2084 2176 regsvr32.exe 30 PID 2176 wrote to memory of 2084 2176 regsvr32.exe 30 PID 2176 wrote to memory of 2084 2176 regsvr32.exe 30 PID 2176 wrote to memory of 2084 2176 regsvr32.exe 30 PID 2176 wrote to memory of 2084 2176 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\af82ecac17a4b9d47cbc12604e9ec4b5_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\af82ecac17a4b9d47cbc12604e9ec4b5_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:2084
-