Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
ceb39c29100126bd11642c2c9ee43851_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ceb39c29100126bd11642c2c9ee43851_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ceb39c29100126bd11642c2c9ee43851_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
ceb39c29100126bd11642c2c9ee43851
-
SHA1
21588fdb3164236a08d0d9681f06cb2f4e568891
-
SHA256
21eec492d17150728353a0bc350c3870a99e85da3f7d7cb3a1f23837c5e6cbad
-
SHA512
ebcfe497dfd2cf5a384d0fc6130f14f2fdb1223f3e3399a3f91047835129625351884e18951d2ec9e001b3ab8b684d8b8f0320e4a23ab77f77b647ab3df4c855
-
SSDEEP
24576:1j5YZjAGwbGCu+pS0+M3tb0pvaep5ZnWSrl:XYZjl+u/0J3tCieD1l
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2284 2192 rundll32.exe 30 PID 2192 wrote to memory of 2284 2192 rundll32.exe 30 PID 2192 wrote to memory of 2284 2192 rundll32.exe 30 PID 2192 wrote to memory of 2284 2192 rundll32.exe 30 PID 2192 wrote to memory of 2284 2192 rundll32.exe 30 PID 2192 wrote to memory of 2284 2192 rundll32.exe 30 PID 2192 wrote to memory of 2284 2192 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ceb39c29100126bd11642c2c9ee43851_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ceb39c29100126bd11642c2c9ee43851_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2284
-