Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 17:15
Static task
static1
Behavioral task
behavioral1
Sample
3108c1802ff38af4c131f981884f1084_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3108c1802ff38af4c131f981884f1084_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
3108c1802ff38af4c131f981884f1084_JaffaCakes118.dll
-
Size
41KB
-
MD5
3108c1802ff38af4c131f981884f1084
-
SHA1
40a09f120ffc8896be41c92c15e41685f1bae812
-
SHA256
b1141046b25ff6391e9c7483b6851de2414e919e6c114f1468723dc51b734314
-
SHA512
494f7a0da9d241535e4d94cb36e44726abdc20354e011cec2fceff96aa3ca678e20a3b74c5207a2cf4103c744a4e8e731cfd2b67a047e33029013a9a25fb9521
-
SSDEEP
768:B3IDqBI9szCgdazgQWXIxayXc4rXdsLdQzO2JYc4t+:KDqBI9sOWX2s4Dd6O9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4292 wrote to memory of 4732 4292 rundll32.exe 83 PID 4292 wrote to memory of 4732 4292 rundll32.exe 83 PID 4292 wrote to memory of 4732 4292 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3108c1802ff38af4c131f981884f1084_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3108c1802ff38af4c131f981884f1084_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4732
-