Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 18:09
Static task
static1
Behavioral task
behavioral1
Sample
c149882b0a57d99c32ea7abe22e07d2b_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c149882b0a57d99c32ea7abe22e07d2b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c149882b0a57d99c32ea7abe22e07d2b_JaffaCakes118.dll
-
Size
9KB
-
MD5
c149882b0a57d99c32ea7abe22e07d2b
-
SHA1
2e8d85a38b7236bdb105e58db8a088069162bd30
-
SHA256
0a3668206dff035c71bad4b4d5fec00ca99744d2ed38047486ace9f4d94dad62
-
SHA512
4d0a0207f0612f68f8f8fb9f0fe7601085bb0a66ce32a2992ec86ea51789f97d70d83699352b1ffffea150c39df75fab0e932d54a78c9c5eefc6394b6fb07b33
-
SSDEEP
96:q1V7dR7uwEU+hCT3GrxZ4MUtPNlz0MdG8EWvdM3IWwG34bxvD:kuwEt8rsTUtPLzKNWSYWF4b1D
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2908 wrote to memory of 3068 2908 rundll32.exe 30 PID 2908 wrote to memory of 3068 2908 rundll32.exe 30 PID 2908 wrote to memory of 3068 2908 rundll32.exe 30 PID 2908 wrote to memory of 3068 2908 rundll32.exe 30 PID 2908 wrote to memory of 3068 2908 rundll32.exe 30 PID 2908 wrote to memory of 3068 2908 rundll32.exe 30 PID 2908 wrote to memory of 3068 2908 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c149882b0a57d99c32ea7abe22e07d2b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c149882b0a57d99c32ea7abe22e07d2b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3068
-