Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 03:31
Static task
static1
Behavioral task
behavioral1
Sample
fb6acff711ac4e510a2a0bc125ff4d65_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb6acff711ac4e510a2a0bc125ff4d65_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fb6acff711ac4e510a2a0bc125ff4d65_JaffaCakes118.dll
-
Size
354KB
-
MD5
fb6acff711ac4e510a2a0bc125ff4d65
-
SHA1
ad56e331ae1796ca1141df4fab4c1863c7759022
-
SHA256
f626024aa0d5dcb606e9427be8a28bd9fbad552db5da5c6568f37a3f05693586
-
SHA512
ee8f733c6ae00c52ccb9b683dcee2bac2e61025cb93c788f836495864b029443b3a638a2f226b107fa7419e36871e3060de9effc6d46cb8a2bea9660c5142c31
-
SSDEEP
6144:tj3CCcKhzh9RswZQ2wFoTslC7oZBGUMhCkiWe7vpxMhSlPaLaOkb203Z1O/axgdJ:JCCcI1Nvsn/sBcccmsAdDOnke
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3536 wrote to memory of 2468 3536 rundll32.exe 89 PID 3536 wrote to memory of 2468 3536 rundll32.exe 89 PID 3536 wrote to memory of 2468 3536 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb6acff711ac4e510a2a0bc125ff4d65_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb6acff711ac4e510a2a0bc125ff4d65_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4380,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=4184 /prefetch:81⤵PID:5004