Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
0c102233f93cf985910d8ec876cc4a18_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0c102233f93cf985910d8ec876cc4a18_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0c102233f93cf985910d8ec876cc4a18_JaffaCakes118.dll
-
Size
836KB
-
MD5
0c102233f93cf985910d8ec876cc4a18
-
SHA1
52ec2f6008792dadfdc224bb7aeeac3cb2c17d1a
-
SHA256
8d62b1a0b14ab3db21774b921995bef66b63f0d9e870a10ca2fd775f866abab1
-
SHA512
bbbdd114656713b23f77d4b92b4b2e6a399c1d5d109c0c3b66a63b449c747d652f2607b6165056f25da5d83af2a777187745697208862c5c24c7f78295d0734e
-
SSDEEP
12288:mz6dHSQV9zntOsCVA9AWZk+eNPOiW/yOVAa7QPoCMC5zUX/unEIZUlxOnY7a+u:muRB9ZOzopWrW/yOVAW2oCMhvdIKxQXF
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2108 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\9a99063d8f.dl rundll32.exe File opened for modification C:\Windows\SysWOW64\9a99063d8f.dl rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2108 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2108 2536 rundll32.exe 30 PID 2536 wrote to memory of 2108 2536 rundll32.exe 30 PID 2536 wrote to memory of 2108 2536 rundll32.exe 30 PID 2536 wrote to memory of 2108 2536 rundll32.exe 30 PID 2536 wrote to memory of 2108 2536 rundll32.exe 30 PID 2536 wrote to memory of 2108 2536 rundll32.exe 30 PID 2536 wrote to memory of 2108 2536 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c102233f93cf985910d8ec876cc4a18_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c102233f93cf985910d8ec876cc4a18_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22B
MD572dd3e09037d95f711561df9168b1752
SHA1ea1bd2b1e756f41d32c526b004bf747f83dbe36c
SHA2567cd8d80a164c171e0d73c03cd5b89ce18858bda1e8f283d83ad4f1c3a3ea6f24
SHA512247e32bb488490349ce2a0139bc6c37584f702a3120592a40f0baaec41a15ff5c19b14821261747f15e9215bf6fd57d5c93ce594e24ff7028697c55aa9500a0b