Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
03ed72877fba082d8f92c4ba3f0210ab_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03ed72877fba082d8f92c4ba3f0210ab_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
03ed72877fba082d8f92c4ba3f0210ab_JaffaCakes118.dll
-
Size
752KB
-
MD5
03ed72877fba082d8f92c4ba3f0210ab
-
SHA1
5dbddeeca98af6b4bd8425f5225c5528d6fa9bce
-
SHA256
9c51f2d8584ff4260db14d2675ceac19e526353f026d321128f62c8fb1249562
-
SHA512
19690792fdd8c41a8b5149ac1fd2fce96a7306f3ed5a0ceb199377e39caf788a179d8ad2f16cee9068c6c8e2828289dfef600890d4a32084439062b3219a4fbb
-
SSDEEP
12288:eI6S/2Etc2445IwR6t+COXsupnd6S/2Etc2445IwR6t+COXsupnCN:tCg4gpCEvndCg4gpCEvnCN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4440 wrote to memory of 3164 4440 rundll32.exe 83 PID 4440 wrote to memory of 3164 4440 rundll32.exe 83 PID 4440 wrote to memory of 3164 4440 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03ed72877fba082d8f92c4ba3f0210ab_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03ed72877fba082d8f92c4ba3f0210ab_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3164
-