Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 16:56
Static task
static1
Behavioral task
behavioral1
Sample
d0035c8a358ef32aaa519f842b91aaff_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0035c8a358ef32aaa519f842b91aaff_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d0035c8a358ef32aaa519f842b91aaff_JaffaCakes118.dll
-
Size
306KB
-
MD5
d0035c8a358ef32aaa519f842b91aaff
-
SHA1
994c5647b7dc7bae4431801090acdc741ce9e680
-
SHA256
3832d4effa9f255177cf04a0b174fa9d795f7282a3f4d73024eee04e5ec6ef7e
-
SHA512
76803bfbc9ead2dd864581491563650266c63e7ba2dac8ded49e157b131bccf3a830bf67018673ebb0d9889b3d5325dbb734e7a664ddadb0459164135c204364
-
SSDEEP
6144:k5QpZGqoblOwc2LhMsh+zCZZ30Efy2uOSvL0eZtWPylwJDNJg:k5Qeqs0wc2Fh+zCP3KOUL0aWPvNJg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2504 2500 rundll32.exe 30 PID 2500 wrote to memory of 2504 2500 rundll32.exe 30 PID 2500 wrote to memory of 2504 2500 rundll32.exe 30 PID 2500 wrote to memory of 2504 2500 rundll32.exe 30 PID 2500 wrote to memory of 2504 2500 rundll32.exe 30 PID 2500 wrote to memory of 2504 2500 rundll32.exe 30 PID 2500 wrote to memory of 2504 2500 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0035c8a358ef32aaa519f842b91aaff_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0035c8a358ef32aaa519f842b91aaff_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2504
-