Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 19:55 UTC
Static task
static1
Behavioral task
behavioral1
Sample
dcf2870ba4b1da81cc39ff24b87c2333_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcf2870ba4b1da81cc39ff24b87c2333_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
dcf2870ba4b1da81cc39ff24b87c2333_JaffaCakes118.dll
-
Size
60KB
-
MD5
dcf2870ba4b1da81cc39ff24b87c2333
-
SHA1
cd193f71cdb1b5894b3adc4f74a913012e36b379
-
SHA256
75da86c90ad2a2dfc26e7e7184d8f49a14fbc791f73441b9dc330fc97b0c4141
-
SHA512
e5dd2de23de3e8c0f45a1328215fd3cc49314b1c7da807ccc6147bdc6f2861cbc15a622b943b4f30d81fcbc1c4b5e7a53811dbe04aa1021533d8f8397b3310e7
-
SSDEEP
1536:B5EuXHROrs7B1y5BnJAGVzaV1uPRPAaVM:B5JXHC9JAGVKM9AaVM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4756 wrote to memory of 4636 4756 rundll32.exe 83 PID 4756 wrote to memory of 4636 4756 rundll32.exe 83 PID 4756 wrote to memory of 4636 4756 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dcf2870ba4b1da81cc39ff24b87c2333_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dcf2870ba4b1da81cc39ff24b87c2333_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4636
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.144.22.2.in-addr.arpaIN PTRResponse73.144.22.2.in-addr.arpaIN PTRa2-22-144-73deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request68.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request232.168.11.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request36.56.20.217.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request42.56.20.217.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request23.236.111.52.in-addr.arpaIN PTRResponse
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
73.144.22.2.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
68.32.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
232.168.11.51.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
71 B 131 B 1 1
DNS Request
36.56.20.217.in-addr.arpa
-
71 B 131 B 1 1
DNS Request
42.56.20.217.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
23.236.111.52.in-addr.arpa