Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 04:20
Static task
static1
Behavioral task
behavioral1
Sample
2ab72988f1c3d9b67c7e7b26df901c98_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ab72988f1c3d9b67c7e7b26df901c98_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
2ab72988f1c3d9b67c7e7b26df901c98_JaffaCakes118.dll
-
Size
104KB
-
MD5
2ab72988f1c3d9b67c7e7b26df901c98
-
SHA1
978b1347cdc3a869b64b811fcaa125f012ef97b1
-
SHA256
b304637540c599f81c77b5a90d5b19a489a5e09256d1f87823f84369d00dc300
-
SHA512
a1ca75c927fc07ca4cfedadc0f7fb5090bf2641fbf103610094fc8b589854f1dc67fe761d8a59d06516a6e69e72c548f918dd08b95760bb26830d3401db9bd73
-
SSDEEP
1536:5VHWz1KXJgM6KmEQ7lC8a+VV9L96uMYLj4iV2DWoCgsdVTrKHKzmd2HaFAi:HT1mEQ788a+VVh96JQj4KMWfiqKd2+F
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2760 2692 rundll32.exe 30 PID 2692 wrote to memory of 2760 2692 rundll32.exe 30 PID 2692 wrote to memory of 2760 2692 rundll32.exe 30 PID 2692 wrote to memory of 2760 2692 rundll32.exe 30 PID 2692 wrote to memory of 2760 2692 rundll32.exe 30 PID 2692 wrote to memory of 2760 2692 rundll32.exe 30 PID 2692 wrote to memory of 2760 2692 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ab72988f1c3d9b67c7e7b26df901c98_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ab72988f1c3d9b67c7e7b26df901c98_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2760
-