Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
0f7139ab76596bc77c9b9f99d340f9e3_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0f7139ab76596bc77c9b9f99d340f9e3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0f7139ab76596bc77c9b9f99d340f9e3_JaffaCakes118.dll
-
Size
19KB
-
MD5
0f7139ab76596bc77c9b9f99d340f9e3
-
SHA1
7c7781279f3e2d15e748ad8d9a1e385700fda19e
-
SHA256
f5a69cd6a0cedc8c0555f1cf35106c33d272014546822e6e8488a801dece70fb
-
SHA512
b9b95dc157b2df998d01887ed83063118aa6c6594afdd79f7ac5dfb72e40b679e62bd2fa2e65cb6f9e3192d0b4bd7e035ef6040199d1a3ce764e940710f32eec
-
SSDEEP
384:PjXzEujF9xQ4cZXH/Zkjcur6+j9PfBVynzhQ:PjQ8fQVRfET8S
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2512 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2512 2396 rundll32.exe 30 PID 2396 wrote to memory of 2512 2396 rundll32.exe 30 PID 2396 wrote to memory of 2512 2396 rundll32.exe 30 PID 2396 wrote to memory of 2512 2396 rundll32.exe 30 PID 2396 wrote to memory of 2512 2396 rundll32.exe 30 PID 2396 wrote to memory of 2512 2396 rundll32.exe 30 PID 2396 wrote to memory of 2512 2396 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f7139ab76596bc77c9b9f99d340f9e3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f7139ab76596bc77c9b9f99d340f9e3_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2512
-