Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
f523911aee1c83b0d9efba5631764992_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f523911aee1c83b0d9efba5631764992_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f523911aee1c83b0d9efba5631764992_JaffaCakes118.dll
-
Size
340KB
-
MD5
f523911aee1c83b0d9efba5631764992
-
SHA1
ae0405ec297fdc7db7e0a86c0b21a433bf3f8b4d
-
SHA256
4c885a1e60dd43a420e72db7f57884a9f2ed1612279e8acab6715ee99f8c9e48
-
SHA512
0d3dc552a3e12d1457dd572647d0b9374caf9dae5858c36c1e2c0b587c13bcbb63f922eded3e8764073c789e95a83753934ccf35f3e7278163267f51b181672c
-
SSDEEP
3072:DvA1p08RqEQAIVEd2gG/vNlo0JFx/pANyCm0PQEKR/JnXRca:D206xWgGxLxWN40PDKR/JnXya
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2148 2912 rundll32.exe 89 PID 2912 wrote to memory of 2148 2912 rundll32.exe 89 PID 2912 wrote to memory of 2148 2912 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f523911aee1c83b0d9efba5631764992_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f523911aee1c83b0d9efba5631764992_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4324,i,12198811467968044966,17227406646827438786,262144 --variations-seed-version --mojo-platform-channel-handle=4072 /prefetch:81⤵PID:2376