Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 17:03
Behavioral task
behavioral1
Sample
d26bc02e12bf04fa72dcbbe1bceb95cd_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d26bc02e12bf04fa72dcbbe1bceb95cd_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d26bc02e12bf04fa72dcbbe1bceb95cd_JaffaCakes118.dll
-
Size
543KB
-
MD5
d26bc02e12bf04fa72dcbbe1bceb95cd
-
SHA1
625028b371356cd29445de47724ecaca2cd42dad
-
SHA256
1aa818a2e2e8550b50dcc490b36c1aced6354dd88af9a61f67fc3af67e74cf9b
-
SHA512
7fa917e56b8e46133111586dd2f981d9982fc075c93a79a46ccffa4a440de4831281e3381333309be762f712f75c2ed4d248e6349d98539d4542fa41f817faef
-
SSDEEP
12288:YbWhPjynZqbGz6TnGYI/8F+KVlFIHoguBfx45Z0EQ2jUGo6Ja8Y:YbWFUH+TRI/8UYyZ045Z0j2jWwY
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2496 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\769bb4c141.dl rundll32.exe File opened for modification C:\Windows\SysWOW64\769bb4c141.dl rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2496 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2496 2508 rundll32.exe 30 PID 2508 wrote to memory of 2496 2508 rundll32.exe 30 PID 2508 wrote to memory of 2496 2508 rundll32.exe 30 PID 2508 wrote to memory of 2496 2508 rundll32.exe 30 PID 2508 wrote to memory of 2496 2508 rundll32.exe 30 PID 2508 wrote to memory of 2496 2508 rundll32.exe 30 PID 2508 wrote to memory of 2496 2508 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d26bc02e12bf04fa72dcbbe1bceb95cd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d26bc02e12bf04fa72dcbbe1bceb95cd_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22B
MD5207986477bd1228de45c2f8f7578a517
SHA1769ebd428f9112ca8c53a4b4eb633f6a811c3072
SHA256c290a1c685da03aa3e8dc8f2be8c54cdab7e558f7130f1e2d36fb8413b866ab0
SHA512b164f04075ced19c8d770cb9792c3b80dde5fabd3aa73d6341294b43ab414255b4d07f122a82c6a936139f26c58d326ffcbf3936877a93b3f08d236ede0322ba