Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 21:44
Behavioral task
behavioral1
Sample
bd4491d0fb797bd26f63491d38622b24_JaffaCakes118.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
bd4491d0fb797bd26f63491d38622b24_JaffaCakes118.dll
-
Size
65KB
-
MD5
bd4491d0fb797bd26f63491d38622b24
-
SHA1
2df1efa94d77b07f2313d2bf531f111223f2836f
-
SHA256
69553c77c179ce335780850f2d2a8db8e01e688bcddfe966f928be470b2c9518
-
SHA512
36d9f56bbe1356b2de6bc22a3b4f81beb620f5820b4ab4dbaf9f7f44bcf41918220916df72fbe54e8f944114144bb30d0cf8d521fc794ec4584955c508eb4eba
-
SSDEEP
1536:qmmM12m92OOPaRt3nZONAeOIDgmZJ2fqtBs4PHzsbm:QMom9IiRdL1oJ2cKwzs6
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2744-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4908 wrote to memory of 2744 4908 rundll32.exe 83 PID 4908 wrote to memory of 2744 4908 rundll32.exe 83 PID 4908 wrote to memory of 2744 4908 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd4491d0fb797bd26f63491d38622b24_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd4491d0fb797bd26f63491d38622b24_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2744
-