Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 10:44
Behavioral task
behavioral1
Sample
da2bda7b55e3a536c0d0f2c9a93ab28c_JaffaCakes118.dll
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
da2bda7b55e3a536c0d0f2c9a93ab28c_JaffaCakes118.dll
-
Size
99KB
-
MD5
da2bda7b55e3a536c0d0f2c9a93ab28c
-
SHA1
9830d60d5f95ff3141616640556d5d98c6f82c2c
-
SHA256
2baf8109a20db4e324b9c71fd90d01053dcb9b37522f1abd5bd661554899a8b6
-
SHA512
42c2ed217d591a533e024309a8721a99c72b18dfd7a42554f0154e1bec63e35cb1d4cdb68cb24ad6d1e783e0e0f4e265a540c51c369836842d429216e34adefe
-
SSDEEP
1536:dC42owFQhOndUNOyTV0XrsAkW9C09Zlx2p8RXvDt4s9:dFhw9d6TQrzhX/2p2vJ4s9
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2228-0-0x0000000010000000-0x000000001000F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2228 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2228 3068 rundll32.exe 30 PID 3068 wrote to memory of 2228 3068 rundll32.exe 30 PID 3068 wrote to memory of 2228 3068 rundll32.exe 30 PID 3068 wrote to memory of 2228 3068 rundll32.exe 30 PID 3068 wrote to memory of 2228 3068 rundll32.exe 30 PID 3068 wrote to memory of 2228 3068 rundll32.exe 30 PID 3068 wrote to memory of 2228 3068 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da2bda7b55e3a536c0d0f2c9a93ab28c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da2bda7b55e3a536c0d0f2c9a93ab28c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2228
-