Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 14:26
Static task
static1
Behavioral task
behavioral1
Sample
d2253dee63351e5f382a14cd1b163318_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2253dee63351e5f382a14cd1b163318_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d2253dee63351e5f382a14cd1b163318_JaffaCakes118.dll
-
Size
268KB
-
MD5
d2253dee63351e5f382a14cd1b163318
-
SHA1
bd839979bfbc94499ef71f15260d8398086f45cf
-
SHA256
93fffadf528216b898062a425bd3f0fd84f73b5e68ce21add349a52f66578b5e
-
SHA512
8d5504a6743f775bb7586ce06f4ef0cb631523805e6f656196e8bc6642d8fea8ba4689e779e99efaa9232d9204c5605b3bddbea493f775fb18aae875fe9f9f9c
-
SSDEEP
3072:MwLsYSbDRkjYYNTb4ZBcl8zNb2+SZVDRb8B6UhFrFPzQTBfRM7niBZfe8etdLz:MwLsj3Y4/jSZMB6UhFJPzQTBJ1B9eL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2852 2204 rundll32.exe 83 PID 2204 wrote to memory of 2852 2204 rundll32.exe 83 PID 2204 wrote to memory of 2852 2204 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d2253dee63351e5f382a14cd1b163318_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d2253dee63351e5f382a14cd1b163318_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2852
-