Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
c0d57616067e8e62294c7739e9d666fd_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c0d57616067e8e62294c7739e9d666fd_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c0d57616067e8e62294c7739e9d666fd_JaffaCakes118.dll
-
Size
118KB
-
MD5
c0d57616067e8e62294c7739e9d666fd
-
SHA1
9ccec3534237b50d0e5b2273f3dfbafce674ef6a
-
SHA256
53802dd9be1522f5694b8ef7564a54cf874a492c7fbfbaea5068079381b4d383
-
SHA512
734d727f856746002961e71a94bae6c063af4244ad5667e3ae64c0e6d3a04f26fdd98048e828cee72b899c903275b64fb6a73839ae104ca7557bd1cdca75132d
-
SSDEEP
3072:3slkvqcaipub0lxRrKy7dddc7fA6kW+BZncp3oxCcBi:/yWpZl3rKyvyStd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2832 2792 rundll32.exe 31 PID 2792 wrote to memory of 2832 2792 rundll32.exe 31 PID 2792 wrote to memory of 2832 2792 rundll32.exe 31 PID 2792 wrote to memory of 2832 2792 rundll32.exe 31 PID 2792 wrote to memory of 2832 2792 rundll32.exe 31 PID 2792 wrote to memory of 2832 2792 rundll32.exe 31 PID 2792 wrote to memory of 2832 2792 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0d57616067e8e62294c7739e9d666fd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0d57616067e8e62294c7739e9d666fd_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2832
-