Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
c16036545803321b48213298b9541254_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c16036545803321b48213298b9541254_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/firefox.vbs
Resource
win7-20240729-en
General
-
Target
$PLUGINSDIR/NSISdl.dll
-
Size
37KB
-
MD5
491918a8925a32d5090f259bc14d8f04
-
SHA1
9e9a282e9c0c5dbdaf3762314450156b9b7ed565
-
SHA256
27fd61c4ffa7d6791e32cba030457540138ada91e06fa24e7040c5a42c5fa22f
-
SHA512
131b391065f575e3ee370d7096aff6d9825ee9f4ec37b413506f59f66acfe09f68f53ff3eb47ac62fb8575a76165833ff293ffe462f280453070161fa928558f
-
SSDEEP
768:Z85u4ZGOSOHm2v33BUis8fBzJ0xrkeQMogwREPgVv5+:Z8NGDOm2v33BTfj0xrLKEPgf+
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 5072 3164 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3056 wrote to memory of 3164 3056 rundll32.exe 86 PID 3056 wrote to memory of 3164 3056 rundll32.exe 86 PID 3056 wrote to memory of 3164 3056 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\NSISdl.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\NSISdl.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3164 -s 6243⤵
- Program crash
PID:5072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3164 -ip 31641⤵PID:3748