Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
b98d26d502f98170ced41c8a79266f5c_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b98d26d502f98170ced41c8a79266f5c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b98d26d502f98170ced41c8a79266f5c_JaffaCakes118.dll
-
Size
132KB
-
MD5
b98d26d502f98170ced41c8a79266f5c
-
SHA1
6632249a4ab8dc0ee73c4d088152f6c70ad7e54c
-
SHA256
07ba862e4932427edc888ce89a19362b2ba03532ca8532b9ed531b4d6531b982
-
SHA512
4831f875f3136f6705e230417ea092ab967c0b3a4c045686e399593325eac1f255c7ff3f7c3d66c417cc974d0aabbf2466da577c99cd6e32a26a7b91d8b02820
-
SSDEEP
3072:mfvikUBClPed2GT3FMbxlALn1PRKZ7DQBeYoTBfJuTaEyQ6:8qulPed2CVMPAL1PMc3oTBRuBy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3248 wrote to memory of 4908 3248 rundll32.exe 84 PID 3248 wrote to memory of 4908 3248 rundll32.exe 84 PID 3248 wrote to memory of 4908 3248 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b98d26d502f98170ced41c8a79266f5c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b98d26d502f98170ced41c8a79266f5c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4908
-