Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
fdacb7183c2b008fb9ea79df47426a89_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdacb7183c2b008fb9ea79df47426a89_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fdacb7183c2b008fb9ea79df47426a89_JaffaCakes118.dll
-
Size
3KB
-
MD5
fdacb7183c2b008fb9ea79df47426a89
-
SHA1
340d6dc54be1f64ae47ae46c4ffe93f94fcc52c4
-
SHA256
207446f4ec1929fb7dd5fe9166e47e814d3ee223562b8f87a08892619a637765
-
SHA512
c07b6190e2e109d68142e5de0e447797435eb2574f32a78560f3d0fd6248648afaaf81af436ca9e75b7afa2f18aaa536f876f50feae69b5ccc0083e4a351dc59
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4352 wrote to memory of 552 4352 rundll32.exe 82 PID 4352 wrote to memory of 552 4352 rundll32.exe 82 PID 4352 wrote to memory of 552 4352 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fdacb7183c2b008fb9ea79df47426a89_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fdacb7183c2b008fb9ea79df47426a89_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:552
-