Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
f6ee49d728ea8b2b7fb408ac6f341b30_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f6ee49d728ea8b2b7fb408ac6f341b30_JaffaCakes118.dll
Resource
win10v2004-20240910-en
General
-
Target
f6ee49d728ea8b2b7fb408ac6f341b30_JaffaCakes118.dll
-
Size
78KB
-
MD5
f6ee49d728ea8b2b7fb408ac6f341b30
-
SHA1
185e7a8920041c410c45b5b04cf6be856f9c99a7
-
SHA256
6acf980ca2efb883463bda2ae489b20106b68fd9ae8ba03ddb4b8bd889d3b9e7
-
SHA512
ffae5dd91de5d741aa96a32a3bca26936010fdbfe656f378f64ffc0cc0b369bb40c3e7c4966016857c6662c7c9603e58f7c9932f4c1fd1355713c2eff4b6bf5f
-
SSDEEP
1536:N2T0C3CoOmbbxfRpK1VotytPFz/84k4yuuExKgXQe9AS+2qRPER:N2DC4ns1V8U/11KgXCRPER
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2888 2720 rundll32.exe 30 PID 2720 wrote to memory of 2888 2720 rundll32.exe 30 PID 2720 wrote to memory of 2888 2720 rundll32.exe 30 PID 2720 wrote to memory of 2888 2720 rundll32.exe 30 PID 2720 wrote to memory of 2888 2720 rundll32.exe 30 PID 2720 wrote to memory of 2888 2720 rundll32.exe 30 PID 2720 wrote to memory of 2888 2720 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f6ee49d728ea8b2b7fb408ac6f341b30_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f6ee49d728ea8b2b7fb408ac6f341b30_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2888
-