Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
df71085c253075b7ec9474348d576427_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df71085c253075b7ec9474348d576427_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/fractal-mandala-screensaver-3.0.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$TEMP/fractal-mandala-screensaver-3.0.exe
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/NSISdl.dll
-
Size
72KB
-
MD5
1611656f80b78236069906365be36264
-
SHA1
064f7a679d484459db3b1768a1b8a898ae788883
-
SHA256
721454186b5a04a5755adcc0b6ad1ea71b0a464d69b5a97529b36e44f6087d3b
-
SHA512
625a6fef59c720afd1c5e5dc91dd549b91dd8d9c7802bebf391687234c4845848a5644e5b16c1b358cd6a43a67a9443f0e080d04c0688c64ec38ac06beeb4328
-
SSDEEP
1536:iq1go754oPtqTbIrKZYexTTvIUQt85rFmTwHoUgyB:iqh14oPtjp6vIUQt85rboUgyB
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2224 4920 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3012 wrote to memory of 4920 3012 rundll32.exe 90 PID 3012 wrote to memory of 4920 3012 rundll32.exe 90 PID 3012 wrote to memory of 4920 3012 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\NSISdl.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\NSISdl.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 6243⤵
- Program crash
PID:2224
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4920 -ip 49201⤵PID:3940
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4292,i,8548254608087149642,10333768245962368401,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:81⤵PID:2068