Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 06:48
Static task
static1
Behavioral task
behavioral1
Sample
3e651aa94b066df6aacc21a636a38208_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3e651aa94b066df6aacc21a636a38208_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
3e651aa94b066df6aacc21a636a38208_JaffaCakes118.dll
-
Size
54KB
-
MD5
3e651aa94b066df6aacc21a636a38208
-
SHA1
4e3f6f8136f9b003cc629f015dcab43a391d8505
-
SHA256
9f3b68114f587ea500e11abc21286ba8644d6433ce73e73aa1edf3019d1ffef2
-
SHA512
97ba05aa616354102e1ecd54f23ef5059a462c3aded08ec42531d06764c8d277db5ddd876566d2f8cc8ef7d9b3520dd47a568328815aba1d8a1749be5fb18dfc
-
SSDEEP
768:hCvtuQabCzQLWOvsmPw7jpVKAwLpN3Y0O+xs2reDEpJ7Ju6IbC90LM:hmtuQ2CzUALwLg+xRpJ7JH8C90A
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1284 wrote to memory of 4556 1284 regsvr32.exe 83 PID 1284 wrote to memory of 4556 1284 regsvr32.exe 83 PID 1284 wrote to memory of 4556 1284 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3e651aa94b066df6aacc21a636a38208_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3e651aa94b066df6aacc21a636a38208_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:4556
-