Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
cec7ed6e0961d64063a8c1631e106ba2_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cec7ed6e0961d64063a8c1631e106ba2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
cec7ed6e0961d64063a8c1631e106ba2_JaffaCakes118.dll
-
Size
232KB
-
MD5
cec7ed6e0961d64063a8c1631e106ba2
-
SHA1
fbd53610202405d79076ba3be91abdd77e14b919
-
SHA256
901e9776e550743dad9a300de9045aed3ee08c964d5feea4bd0bd520e6e0b371
-
SHA512
3f2bdfebef84809457cc895ec95b563f93c523aea3705e4cbc28e1df69633c99e11fef7b46a7601ecfdd01e149abbfb1cf2b272419838ddd91ce1a4d041b8ff4
-
SSDEEP
6144:BcMSPrGHXhPppJ78b0D6afOD2haJacJK/XXxLUDVeN:Bc9GHXhPFpxLxg
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2688 1284 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1284 2012 rundll32.exe 30 PID 2012 wrote to memory of 1284 2012 rundll32.exe 30 PID 2012 wrote to memory of 1284 2012 rundll32.exe 30 PID 2012 wrote to memory of 1284 2012 rundll32.exe 30 PID 2012 wrote to memory of 1284 2012 rundll32.exe 30 PID 2012 wrote to memory of 1284 2012 rundll32.exe 30 PID 2012 wrote to memory of 1284 2012 rundll32.exe 30 PID 1284 wrote to memory of 2688 1284 rundll32.exe 31 PID 1284 wrote to memory of 2688 1284 rundll32.exe 31 PID 1284 wrote to memory of 2688 1284 rundll32.exe 31 PID 1284 wrote to memory of 2688 1284 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cec7ed6e0961d64063a8c1631e106ba2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cec7ed6e0961d64063a8c1631e106ba2_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 2243⤵
- Program crash
PID:2688
-
-