Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 04:08
Static task
static1
Behavioral task
behavioral1
Sample
fb78e2dcf16f75468b95a5730a574522_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fb78e2dcf16f75468b95a5730a574522_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fb78e2dcf16f75468b95a5730a574522_JaffaCakes118.dll
-
Size
35KB
-
MD5
fb78e2dcf16f75468b95a5730a574522
-
SHA1
c58dfe6fedf706d88627835f5338e428b7f4afc4
-
SHA256
9d1fe87b05b6bb0f7e424778833415d557acdfc8d8677da2462a0529fa2e68ed
-
SHA512
a7751b0faed8a7aa7c30b844386cb233aa09d1edd50a90bdfd00aa8cbf4935fd7493b1bfccfa7da4775ee4f87ba50a914089838cec4f89a8f50bc14da14203d1
-
SSDEEP
768:HBRWZLG7yRUePtICy1QoqVssBz9jprrYsa9IPMwzVrcNLD1:hRWE3q1jJjZhiIkwzVqLD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1876 wrote to memory of 212 1876 rundll32.exe 82 PID 1876 wrote to memory of 212 1876 rundll32.exe 82 PID 1876 wrote to memory of 212 1876 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb78e2dcf16f75468b95a5730a574522_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb78e2dcf16f75468b95a5730a574522_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:212
-