Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 07:02
Static task
static1
Behavioral task
behavioral1
Sample
d5d4d2802c0fb8e25c8e4fa78809b43f_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5d4d2802c0fb8e25c8e4fa78809b43f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d5d4d2802c0fb8e25c8e4fa78809b43f_JaffaCakes118.dll
-
Size
37KB
-
MD5
d5d4d2802c0fb8e25c8e4fa78809b43f
-
SHA1
a3c0c9eea738858509b6a3823acc47fb8cc0635d
-
SHA256
8f8cae540b2ccb3ff626a76554caaee5c6d60d99e3415530d9c75da4680c65a1
-
SHA512
14ab7bfcc6a53b99c170fe407c7d23ebe90b5ae3815a47c8bfaa8b619e9ecab44e4c498e22d6156d00d88af5b73bbefe4fbd2f8e8abd22efeefc32a5975bd8e6
-
SSDEEP
768:CHLNNwWByXbpzA6w/4I2NQPx57uQdUikbvlVOb+YTRyi5:Yv/0az2KH7ugUTP8TRp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2080 wrote to memory of 4304 2080 rundll32.exe 83 PID 2080 wrote to memory of 4304 2080 rundll32.exe 83 PID 2080 wrote to memory of 4304 2080 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5d4d2802c0fb8e25c8e4fa78809b43f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5d4d2802c0fb8e25c8e4fa78809b43f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4304
-