Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
0c102233f93cf985910d8ec876cc4a18_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0c102233f93cf985910d8ec876cc4a18_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0c102233f93cf985910d8ec876cc4a18_JaffaCakes118.dll
-
Size
836KB
-
MD5
0c102233f93cf985910d8ec876cc4a18
-
SHA1
52ec2f6008792dadfdc224bb7aeeac3cb2c17d1a
-
SHA256
8d62b1a0b14ab3db21774b921995bef66b63f0d9e870a10ca2fd775f866abab1
-
SHA512
bbbdd114656713b23f77d4b92b4b2e6a399c1d5d109c0c3b66a63b449c747d652f2607b6165056f25da5d83af2a777187745697208862c5c24c7f78295d0734e
-
SSDEEP
12288:mz6dHSQV9zntOsCVA9AWZk+eNPOiW/yOVAa7QPoCMC5zUX/unEIZUlxOnY7a+u:muRB9ZOzopWrW/yOVAW2oCMhvdIKxQXF
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 45 4996 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\7e30ca5ccb.dl rundll32.exe File opened for modification C:\Windows\SysWOW64\7e30ca5ccb.dl rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4996 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5116 wrote to memory of 4996 5116 rundll32.exe 82 PID 5116 wrote to memory of 4996 5116 rundll32.exe 82 PID 5116 wrote to memory of 4996 5116 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c102233f93cf985910d8ec876cc4a18_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c102233f93cf985910d8ec876cc4a18_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:4996
-