Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
cf252e42dfb24b14b719e7e67298e305_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf252e42dfb24b14b719e7e67298e305_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
cf252e42dfb24b14b719e7e67298e305_JaffaCakes118.dll
-
Size
82KB
-
MD5
cf252e42dfb24b14b719e7e67298e305
-
SHA1
ca5fc4aa2d614fd4909c0f34d75d85dd9a95def6
-
SHA256
365cc0f86c311073eb143440f3e2baf8c992eb9db79af0ffd9a2f96c0733a92f
-
SHA512
ccbf5294f3151e0c7414e7185d5de82a4c43154cebe214f43552373fd819b68e6cf4ea2ce80f3119cc124e83a0773941607e2f1ad9c15140186bd93a939174f0
-
SSDEEP
1536:NVYQ329/z5mqpVWaQwwczHdRlu9RQ26euWjroDTRPd0Ki:NVY0K5mqnCw+9RAeuiQTi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2156 2948 regsvr32.exe 30 PID 2948 wrote to memory of 2156 2948 regsvr32.exe 30 PID 2948 wrote to memory of 2156 2948 regsvr32.exe 30 PID 2948 wrote to memory of 2156 2948 regsvr32.exe 30 PID 2948 wrote to memory of 2156 2948 regsvr32.exe 30 PID 2948 wrote to memory of 2156 2948 regsvr32.exe 30 PID 2948 wrote to memory of 2156 2948 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\cf252e42dfb24b14b719e7e67298e305_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\cf252e42dfb24b14b719e7e67298e305_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:2156
-