Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 23:36
Behavioral task
behavioral1
Sample
03a1125b41b2650783c978f87a47beb4_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
03a1125b41b2650783c978f87a47beb4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
03a1125b41b2650783c978f87a47beb4_JaffaCakes118.dll
-
Size
94KB
-
MD5
03a1125b41b2650783c978f87a47beb4
-
SHA1
216731cc84fe6a420066477059be8de48f9b8837
-
SHA256
af57854706d9ac944c639b4b945bf2e03f46f688dcde29d37799d6c2ab0c0e36
-
SHA512
e9b15cf2811f9c36f749231a7db9ee88d2736a942433481ddbef57cafa4d1cb5b210731d469c7d9c65c281b6d7639f5664b0cd18f8c35e2abd3ca40b34a1eb28
-
SSDEEP
1536:45NS+8cSd85cV3dcLBUSrdpEk9L83dqbbjrnDTA5AXU7vmCaODz7:45NS+m85atczL83inQmXkvlaY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2168 1900 rundll32.exe 30 PID 1900 wrote to memory of 2168 1900 rundll32.exe 30 PID 1900 wrote to memory of 2168 1900 rundll32.exe 30 PID 1900 wrote to memory of 2168 1900 rundll32.exe 30 PID 1900 wrote to memory of 2168 1900 rundll32.exe 30 PID 1900 wrote to memory of 2168 1900 rundll32.exe 30 PID 1900 wrote to memory of 2168 1900 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03a1125b41b2650783c978f87a47beb4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03a1125b41b2650783c978f87a47beb4_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2168
-