Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/09/2024, 15:40 UTC

General

  • Target

    faad5c2752d315ab6303bd4ff631e5a5_JaffaCakes118.dll

  • Size

    307KB

  • MD5

    faad5c2752d315ab6303bd4ff631e5a5

  • SHA1

    29c4b65e004f0af259ac24d988eb05e711e07d13

  • SHA256

    45bba19aaa1bdb1ead33b1829e03abbc77e64ec209beba97bf19985e4052a099

  • SHA512

    b39671d281a5f3c5d5d8bb7aa7eef41db61d327ed73762a7eb6c88d65f5b768c5d2d2794dfc6c4a6ebfaf01c16b37eb2ab3769500a7a2f1a98df1d022a054aea

  • SSDEEP

    6144:nCR+g2DwO8UwuaDzGkdtjM4aFZgDyj5EbAao01I18RzIVW84F2FdBXw2:CkhMO8Ua+k6FZxj5Eb3oXcq40pA2

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\faad5c2752d315ab6303bd4ff631e5a5_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\faad5c2752d315ab6303bd4ff631e5a5_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1736-3-0x0000000010000000-0x000000001009F000-memory.dmp

    Filesize

    636KB

  • memory/1736-2-0x0000000010000000-0x000000001009F000-memory.dmp

    Filesize

    636KB

  • memory/1736-1-0x0000000010000000-0x000000001009F000-memory.dmp

    Filesize

    636KB

  • memory/1736-0-0x0000000010000000-0x000000001009F000-memory.dmp

    Filesize

    636KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.