Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 13:36
Static task
static1
Behavioral task
behavioral1
Sample
019a81518bc21af550c46b3d26dbc00c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
019a81518bc21af550c46b3d26dbc00c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
019a81518bc21af550c46b3d26dbc00c_JaffaCakes118.dll
-
Size
256KB
-
MD5
019a81518bc21af550c46b3d26dbc00c
-
SHA1
290d26464aa9aa5924dca6ee8e85fe75030d62f4
-
SHA256
b3434e19381affdadb1a608391c50c1ee3783e6de195b06163e2b4ae3ac9df86
-
SHA512
f71f6c123f967be234bfd3c98cee9e52c23c6158de8495036b36e6e1213ebb144b04e18bd4fc56246552f0deb8ac7cc739531c2d9ea54d404e67bbd7f5d4e555
-
SSDEEP
3072:MoyxvfG66aQDSl6QjZciV2oyAHKl/zmAI:MoQf3FG2fZc0yYDn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2464 wrote to memory of 3824 2464 rundll32.exe 82 PID 2464 wrote to memory of 3824 2464 rundll32.exe 82 PID 2464 wrote to memory of 3824 2464 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\019a81518bc21af550c46b3d26dbc00c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\019a81518bc21af550c46b3d26dbc00c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3824
-