Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
d5b19c250cc19abad9e60992fc6b1ced_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d5b19c250cc19abad9e60992fc6b1ced_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d5b19c250cc19abad9e60992fc6b1ced_JaffaCakes118.dll
-
Size
24KB
-
MD5
d5b19c250cc19abad9e60992fc6b1ced
-
SHA1
86128bb67bfe18b63dc20f6187dbcba3d490a879
-
SHA256
15678a33a03aeff86520fbed11356a869dde9267f5d733a5ddcb3ef5a6f20b86
-
SHA512
8ad2c2c170a82fbba2b91009fb8a3e78fa1bebf612027c4dd0e15d3918221c4b98fa5986b6c4e716901fd63bf1f0394c7774ddacfad504d1f7b8dca072b28af6
-
SSDEEP
384:2RCJ8mkOMEPbqqCs397PlOTfpiWm+SajLtDJUG7+b4TuNWXItJJIU9ykP8clxEEu:HJ5zdDxF397ELhV5y8HTVXINeWxI
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\clbcatq.dll369652812 rundll32.exe File opened for modification C:\Windows\linkinfo.dll1350940542 rundll32.exe File created C:\Windows\linkinfo.dll rundll32.exe File created C:\Windows\twain_86.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1320 wrote to memory of 4664 1320 rundll32.exe 90 PID 1320 wrote to memory of 4664 1320 rundll32.exe 90 PID 1320 wrote to memory of 4664 1320 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5b19c250cc19abad9e60992fc6b1ced_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5b19c250cc19abad9e60992fc6b1ced_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4336,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=1040 /prefetch:81⤵PID:1228