Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 17:03
Behavioral task
behavioral1
Sample
d26bc02e12bf04fa72dcbbe1bceb95cd_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d26bc02e12bf04fa72dcbbe1bceb95cd_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d26bc02e12bf04fa72dcbbe1bceb95cd_JaffaCakes118.dll
-
Size
543KB
-
MD5
d26bc02e12bf04fa72dcbbe1bceb95cd
-
SHA1
625028b371356cd29445de47724ecaca2cd42dad
-
SHA256
1aa818a2e2e8550b50dcc490b36c1aced6354dd88af9a61f67fc3af67e74cf9b
-
SHA512
7fa917e56b8e46133111586dd2f981d9982fc075c93a79a46ccffa4a440de4831281e3381333309be762f712f75c2ed4d248e6349d98539d4542fa41f817faef
-
SSDEEP
12288:YbWhPjynZqbGz6TnGYI/8F+KVlFIHoguBfx45Z0EQ2jUGo6Ja8Y:YbWFUH+TRI/8UYyZ045Z0j2jWwY
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\9af2cc49d7.dl rundll32.exe File opened for modification C:\Windows\SysWOW64\9af2cc49d7.dl rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1588 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1460 wrote to memory of 1588 1460 rundll32.exe 85 PID 1460 wrote to memory of 1588 1460 rundll32.exe 85 PID 1460 wrote to memory of 1588 1460 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d26bc02e12bf04fa72dcbbe1bceb95cd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d26bc02e12bf04fa72dcbbe1bceb95cd_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:1588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34B
MD5b060efd03782c90252b22f3893e7219f
SHA1ae6218047687cc46a7387292fac129fe746f1488
SHA2569b74f02c8a4355ba70ceaaaa6eaffc0d5dbb39b95b24f455891d0b3d724ff395
SHA51298a72e48585a9b0a46569634d8298a0aad89a991ee4b584b29d60f292f8f1ee8de3a88bcb89fdfd7038015885614b47d34b63dbf35c18ba8aa7dff9b88539fce