Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 01:46
Behavioral task
behavioral1
Sample
b9e417a1ff82adbbba25640907d5a5c3_JaffaCakes118.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
b9e417a1ff82adbbba25640907d5a5c3_JaffaCakes118.dll
-
Size
57KB
-
MD5
b9e417a1ff82adbbba25640907d5a5c3
-
SHA1
50a86abc2289089929dc57b134b5f722a4daec7f
-
SHA256
2b1276e57fb1e6f86953dfe1296f596d05364c5ff71ff3e24c798f2118082bfc
-
SHA512
9af8d9e12688d254e4e01790f90df820233d1db336795af04b19d3a19863c6fac7127f63908ed8f8f5cd31ddc813d30bb3ec1720304ed007e89b575d8d61e2d7
-
SSDEEP
1536:kjRURODLwVVUNBI76LkMUzs3H9AIBDj59nbvBI/cfVyA:kFSODU/emuR3+gl9nF1dyA
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3048-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4020 wrote to memory of 3048 4020 rundll32.exe 84 PID 4020 wrote to memory of 3048 4020 rundll32.exe 84 PID 4020 wrote to memory of 3048 4020 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b9e417a1ff82adbbba25640907d5a5c3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b9e417a1ff82adbbba25640907d5a5c3_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3048
-