Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
c1fe3107802decbe438188646d71fa77_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c1fe3107802decbe438188646d71fa77_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c1fe3107802decbe438188646d71fa77_JaffaCakes118.dll
-
Size
72KB
-
MD5
c1fe3107802decbe438188646d71fa77
-
SHA1
e8e5bfeef6f19aa4a3896dd49031a6238e427164
-
SHA256
ab0c4f47870f5b4051d92da22b80cc91f6fcf735ea2263ac8e23885e2b756c3f
-
SHA512
38d121a84a2ceda942e591f2bc49248d93641ba16fd96f693cf8a08cf792c81451bb3973a2b2f4618e9ec372c919749601c892b6b9e4bfc3d6cb9bd1b63614fe
-
SSDEEP
1536:Sjjl3nwzSuOqBubw/WgT6zMKAOK2lCWcQajhRuP:C5UOq0ukgOK2l7aFQP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2500 2096 rundll32.exe 30 PID 2096 wrote to memory of 2500 2096 rundll32.exe 30 PID 2096 wrote to memory of 2500 2096 rundll32.exe 30 PID 2096 wrote to memory of 2500 2096 rundll32.exe 30 PID 2096 wrote to memory of 2500 2096 rundll32.exe 30 PID 2096 wrote to memory of 2500 2096 rundll32.exe 30 PID 2096 wrote to memory of 2500 2096 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1fe3107802decbe438188646d71fa77_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1fe3107802decbe438188646d71fa77_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2500
-