Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
142189d89c654a9496725134a8b01ded_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
142189d89c654a9496725134a8b01ded_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
142189d89c654a9496725134a8b01ded_JaffaCakes118.dll
-
Size
116KB
-
MD5
142189d89c654a9496725134a8b01ded
-
SHA1
72e88aa8ec97baceaf0e36c45066e3c604592b4f
-
SHA256
1553c465e34606ef451c8e3a80579deee46f6fec2c1ce44befa7267508fa5787
-
SHA512
1be22e500d54670550d194468a836593ebd4211462760ddb807099e6e361e87586067ab7f9a026ff2ecf447ae760421d605e8949a2a889a3963ec4a5e9202cc7
-
SSDEEP
1536:CEP894bSD/7DKHvBGnwfUV53MTBrzNsEgeMkPD6q0XDdMOUBWRaas4V:yGGgsn/V53MTBrGTe/fIdxU4aaV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2596 wrote to memory of 4348 2596 rundll32.exe 82 PID 2596 wrote to memory of 4348 2596 rundll32.exe 82 PID 2596 wrote to memory of 4348 2596 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\142189d89c654a9496725134a8b01ded_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\142189d89c654a9496725134a8b01ded_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4348
-