Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
b915191fe54d81effcda99cc9d18e32a_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b915191fe54d81effcda99cc9d18e32a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b915191fe54d81effcda99cc9d18e32a_JaffaCakes118.dll
-
Size
51KB
-
MD5
b915191fe54d81effcda99cc9d18e32a
-
SHA1
e3f4f2b4ecf6fc49c96fd136afc9c4ab26768cd5
-
SHA256
2736dd77aaa165ef3942d39f1616e6107808625fbc96c439e862f3b42637623c
-
SHA512
39a5bea3d9068944d6126e782e2e190fde70a5e79b03919d5f9e54a74085cd5e554b1766edf1ff603a3c2cfe43974701b3ba7eedcb0b2477705b35d626ae1d00
-
SSDEEP
768:Hv2k+IdCOSrq46QNMo9DN2UuzknUY63e8P7gKgCiPE1Uf2hr:1bd4n9B2UAY63VP7gnP8Ufc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2948 2556 rundll32.exe 30 PID 2556 wrote to memory of 2948 2556 rundll32.exe 30 PID 2556 wrote to memory of 2948 2556 rundll32.exe 30 PID 2556 wrote to memory of 2948 2556 rundll32.exe 30 PID 2556 wrote to memory of 2948 2556 rundll32.exe 30 PID 2556 wrote to memory of 2948 2556 rundll32.exe 30 PID 2556 wrote to memory of 2948 2556 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b915191fe54d81effcda99cc9d18e32a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b915191fe54d81effcda99cc9d18e32a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2948
-