Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
d23b6c487af7ad00e3892d4626f7f36a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d23b6c487af7ad00e3892d4626f7f36a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d23b6c487af7ad00e3892d4626f7f36a_JaffaCakes118.dll
-
Size
48KB
-
MD5
d23b6c487af7ad00e3892d4626f7f36a
-
SHA1
d5e211886746a4448fb0ea7e23767e8af15427e5
-
SHA256
259247808a15fdfd41749612e37feb13af72ae75f41ee570c9beb04f57951709
-
SHA512
9aa1c7d7bbb59acf97282dd7cca8a10cb33003288286f9cde183131109e206ffe9f47143a61c9b91e33ca0715cdda965aa1acc56491e4786b0426c280c006569
-
SSDEEP
768:+z+aTD38pNz0ddBRsboktoORM8sYfPotfPR2ofi:+DTD3GwB6BoJLkoZPR2ofi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4484 wrote to memory of 4512 4484 rundll32.exe 83 PID 4484 wrote to memory of 4512 4484 rundll32.exe 83 PID 4484 wrote to memory of 4512 4484 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d23b6c487af7ad00e3892d4626f7f36a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d23b6c487af7ad00e3892d4626f7f36a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4512
-