Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2024, 18:52

General

  • Target

    1022beb7fcf339cca6e095fa0d4d340e_JaffaCakes118.dll

  • Size

    58KB

  • MD5

    1022beb7fcf339cca6e095fa0d4d340e

  • SHA1

    bacfa23debab37b5b8348d2837ce57b2af287696

  • SHA256

    e05d65ec7a2454c6f98d7cddf5a2f7a59a9738b720d09ead85a2293ae2634081

  • SHA512

    ed18d39b4c3e5d71d40fcad74dd9d4be0a07a74714c95f8411833f205aa877f6719709b4f9d1b2cccc3d7c7a8c6b6894882a270eb18b566a0602431d528aaa81

  • SSDEEP

    1536:BfQAl+7ovO02rVW85X+ao8l+AxLvOoNvgifZyiVVjXD6H:dQAl+pTWwos+8LOoNPffVVjXA

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1022beb7fcf339cca6e095fa0d4d340e_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1022beb7fcf339cca6e095fa0d4d340e_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1688-0-0x0000000010000000-0x000000001000A000-memory.dmp

    Filesize

    40KB

  • memory/1688-5-0x0000000010000000-0x000000001000A000-memory.dmp

    Filesize

    40KB

  • memory/1688-4-0x0000000010008000-0x0000000010009000-memory.dmp

    Filesize

    4KB

  • memory/1688-3-0x0000000010000000-0x000000001000A000-memory.dmp

    Filesize

    40KB

  • memory/1688-2-0x0000000010000000-0x000000001000A000-memory.dmp

    Filesize

    40KB

  • memory/1688-1-0x0000000010000000-0x000000001000A000-memory.dmp

    Filesize

    40KB