Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2024, 02:02
Static task
static1
Behavioral task
behavioral1
Sample
c42f2d418ec9577b24ef6e5402c88340_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c42f2d418ec9577b24ef6e5402c88340_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c42f2d418ec9577b24ef6e5402c88340_JaffaCakes118.dll
-
Size
340KB
-
MD5
c42f2d418ec9577b24ef6e5402c88340
-
SHA1
9b27d24116db8bb51b8d8f83e4b6d6acb3a564df
-
SHA256
7c36ff1003e2832ca580d049e722a1d9fb103e0ba0b1f1ce76ad4b3f8be6fbcf
-
SHA512
774056294c3b2373aa0fb100ae97d90a8edcce50bd1a05620dbbf353100418cb375bdc9fa34c1755649361e9a01faaf86b5bd48ee0e1ff4d607e0804ddf60452
-
SSDEEP
3072:evA1p08RqEQAIVEd2gG/vNlo0JFx/pANyCm0PQEKR/JnXHWP:e206xWgGxLxWN40PDKR/JnX2P
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 348 wrote to memory of 4528 348 rundll32.exe 93 PID 348 wrote to memory of 4528 348 rundll32.exe 93 PID 348 wrote to memory of 4528 348 rundll32.exe 93
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c42f2d418ec9577b24ef6e5402c88340_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c42f2d418ec9577b24ef6e5402c88340_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4288,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=4188 /prefetch:81⤵PID:3572