Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 21:01 UTC
Static task
static1
Behavioral task
behavioral1
Sample
c7a4fe5a28c5f3ff45a4b2338ff2eb0f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c7a4fe5a28c5f3ff45a4b2338ff2eb0f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c7a4fe5a28c5f3ff45a4b2338ff2eb0f_JaffaCakes118.dll
-
Size
308KB
-
MD5
c7a4fe5a28c5f3ff45a4b2338ff2eb0f
-
SHA1
5d6b0aa6c56b45db43c71e5585d1f934511f364f
-
SHA256
82b64aaedf9112e2e2f36de9916e530d1553519f3246c63b5e85a417912c8416
-
SHA512
ad8465ada3c8609c04a22753fb81cd30e659b7a550ab937bde3799d00d829f12ba37f79a2973675135fbda2aaf823ff08dfb37264c8ba5784e70b36682f23ff1
-
SSDEEP
6144:bre+pWADsyCxzPOQP76vEScrQI2r7QDroXoKHFw2:3e+cxVKQP7DrQIqwrtKlB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 304 wrote to memory of 1800 304 rundll32.exe 30 PID 304 wrote to memory of 1800 304 rundll32.exe 30 PID 304 wrote to memory of 1800 304 rundll32.exe 30 PID 304 wrote to memory of 1800 304 rundll32.exe 30 PID 304 wrote to memory of 1800 304 rundll32.exe 30 PID 304 wrote to memory of 1800 304 rundll32.exe 30 PID 304 wrote to memory of 1800 304 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c7a4fe5a28c5f3ff45a4b2338ff2eb0f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c7a4fe5a28c5f3ff45a4b2338ff2eb0f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1800
-