Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 13:47
Static task
static1
Behavioral task
behavioral1
Sample
eb75da004455163d58cb0e95da446484_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb75da004455163d58cb0e95da446484_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eb75da004455163d58cb0e95da446484_JaffaCakes118.dll
-
Size
40KB
-
MD5
eb75da004455163d58cb0e95da446484
-
SHA1
10f1137e9157b2bef3a5a61c1487eaa1b4458ec6
-
SHA256
1d4cb30df1aab29623c4ba446e146019d91ef3bb14eb5b331b17227be759ba40
-
SHA512
18db2a277edb5262b7f6d44cfc1efa8f5df8fb6dd00d6468e5593926d1811bb863a09e77aa8cc9cdf56557f2c15a3416dcc61b66a07a680f50825c1bcef67bda
-
SSDEEP
768:NLY9qwqOV9h2N2Px2t2B2d2R2A0jTnRpRJ+BHFbLNO/DloKURp4jB+b:N89qwqOV9h2N2J2t2B2d2R2A0jTn3Rkk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 588 wrote to memory of 2252 588 rundll32.exe 30 PID 588 wrote to memory of 2252 588 rundll32.exe 30 PID 588 wrote to memory of 2252 588 rundll32.exe 30 PID 588 wrote to memory of 2252 588 rundll32.exe 30 PID 588 wrote to memory of 2252 588 rundll32.exe 30 PID 588 wrote to memory of 2252 588 rundll32.exe 30 PID 588 wrote to memory of 2252 588 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb75da004455163d58cb0e95da446484_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb75da004455163d58cb0e95da446484_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2252
-