Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 14:48
Static task
static1
Behavioral task
behavioral1
Sample
b3e4f12c992293b70174adab9e268f3e_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b3e4f12c992293b70174adab9e268f3e_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b3e4f12c992293b70174adab9e268f3e_JaffaCakes118.dll
-
Size
107KB
-
MD5
b3e4f12c992293b70174adab9e268f3e
-
SHA1
5dc8ed843bc93fbf906427683ac919911df54a1d
-
SHA256
9871ce8302d74c4e00573bb42d97c037979d1f44f57a5c24dc631c8eb0e7c11e
-
SHA512
04765063cb64b11294d1a061f8039d1faddd7a4cdcd4aad661bb113087f77b5758f460fddbe8dbe0b67bf9704f548392e2d7a46c374c912ce1bf687c65e7a998
-
SSDEEP
3072:Xdq9vgh1qBKO2N2fpCyfMLmkcICuecbS:Xdqm102EU6kcFbY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2988 wrote to memory of 4288 2988 rundll32.exe 86 PID 2988 wrote to memory of 4288 2988 rundll32.exe 86 PID 2988 wrote to memory of 4288 2988 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3e4f12c992293b70174adab9e268f3e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3e4f12c992293b70174adab9e268f3e_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4288
-