Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
b3df62bb21227431683b0ef65a7fa353_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b3df62bb21227431683b0ef65a7fa353_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b3df62bb21227431683b0ef65a7fa353_JaffaCakes118.dll
-
Size
11KB
-
MD5
b3df62bb21227431683b0ef65a7fa353
-
SHA1
1100804dcc23821943b883658ea18c67ccc07dc8
-
SHA256
dec728d579e2d9cdc1132f9935d3a0d2c1235d19d60c9b29054a22cfdfc6d32f
-
SHA512
40f92d9f7cc7a4f663c3422e332413ade2008e920c7859b6c6be0dc28c63278f48518984a4aaef873d63b06b4d9fc46712988e1db5bd5ae65191017aac5ad554
-
SSDEEP
192:/fJB9MBfR5m7YKy+CfNzHmgl5kJxxJUtXaETVM:/f7gkvUJmuRXaA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3604 wrote to memory of 4976 3604 rundll32.exe 84 PID 3604 wrote to memory of 4976 3604 rundll32.exe 84 PID 3604 wrote to memory of 4976 3604 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3df62bb21227431683b0ef65a7fa353_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3df62bb21227431683b0ef65a7fa353_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4976
-