Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 23:36

General

  • Target

    eea7ad06cec74309dee0314fd99136c4_JaffaCakes118.dll

  • Size

    56KB

  • MD5

    eea7ad06cec74309dee0314fd99136c4

  • SHA1

    1af819bb1af4bab278fe00a9e7d1243400cc5585

  • SHA256

    6d02fb07615eaf105ff481182c9637f217015d006e7b55c8f81086c82e5b57d4

  • SHA512

    81581ba1dc68c527def0ae564f984eea30116556669557c536e04694e3cc5cd619e5bb0b090ef10b74c2f03d3638c6806a5cf9d0f2176316fd1a646c5bcc3172

  • SSDEEP

    384:ESOmvo6h37BvuaAXnrAjpRz8Bg1BU30Pbaw0TzsxCdbYiIhRvIGOuxLMB9Gg6sdd:EbGo6hLkt6z84UeqYNhSlHXn

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\eea7ad06cec74309dee0314fd99136c4_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\eea7ad06cec74309dee0314fd99136c4_JaffaCakes118.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:2100
      • C:\Windows\SysWOW64\F12F7B6B.exe
        C:\Windows\system32\F12F7B6B.exe
        3⤵
          PID:3060

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Windows\SysWOW64\F12F7B6B.exe

      Filesize

      10KB

      MD5

      b55af1074ece2f5d04f7032de9168ded

      SHA1

      f02f6d1acc64b57ac46eebac245627eb493fb193

      SHA256

      c112b44e366f72feb6592b27d177e5f2349df120070a55960b71053996801539

      SHA512

      601dcfe8a510bcfe61b1385e33e7cf3b1333c95a37e520628d8d4406f9bc86692e46e184436578e353b02237ad3981edf4d7ca033fe25a235225377659fbc02a

    • memory/2100-3-0x0000000000230000-0x0000000000241000-memory.dmp

      Filesize

      68KB