Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
79s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 09:12
Static task
static1
Behavioral task
behavioral1
Sample
b71681296871f06e38184d42f6138f33_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b71681296871f06e38184d42f6138f33_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b71681296871f06e38184d42f6138f33_JaffaCakes118.dll
-
Size
166KB
-
MD5
b71681296871f06e38184d42f6138f33
-
SHA1
f5fe7fc873fbe89df967a67cf78e953f65baa04e
-
SHA256
235d50259372f7c53c7b5500efd19e506192f1e0ba702d5c320e2c05213f465f
-
SHA512
7af133bb7bf664be2f6ee19e5d193a87205306f135f4f4f668c0369818a9ef0903937af9540a53a2dd5bf51a16328f36a155e26985215bbd5c12e1b544bf9ef9
-
SSDEEP
3072:IGUmn+79jdoJ51BsV0PHn60uawFMRswKFev9gEkIAyZ8uYLADHbsz:IGU3Rdoj1BRn6twK8kIbZvUib
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3492 4284 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4284 rundll32.exe Token: SeSecurityPrivilege 4284 rundll32.exe Token: SeLoadDriverPrivilege 4284 rundll32.exe Token: SeSystemProfilePrivilege 4284 rundll32.exe Token: SeSystemtimePrivilege 4284 rundll32.exe Token: SeProfSingleProcessPrivilege 4284 rundll32.exe Token: SeIncBasePriorityPrivilege 4284 rundll32.exe Token: SeCreatePagefilePrivilege 4284 rundll32.exe Token: SeShutdownPrivilege 4284 rundll32.exe Token: SeDebugPrivilege 4284 rundll32.exe Token: SeSystemEnvironmentPrivilege 4284 rundll32.exe Token: SeRemoteShutdownPrivilege 4284 rundll32.exe Token: SeUndockPrivilege 4284 rundll32.exe Token: SeManageVolumePrivilege 4284 rundll32.exe Token: 33 4284 rundll32.exe Token: 34 4284 rundll32.exe Token: 35 4284 rundll32.exe Token: 36 4284 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2780 wrote to memory of 4284 2780 rundll32.exe 88 PID 2780 wrote to memory of 4284 2780 rundll32.exe 88 PID 2780 wrote to memory of 4284 2780 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b71681296871f06e38184d42f6138f33_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b71681296871f06e38184d42f6138f33_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 6563⤵
- Program crash
PID:3492
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4284 -ip 42841⤵PID:2988