Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
53f72f13b6e...18.exe
windows7-x64
33f72f13b6e...18.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3Alawar.url
windows7-x64
6Alawar.url
windows10-2004-x64
3HTMLayout.dll
windows7-x64
3HTMLayout.dll
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 10:55
Behavioral task
behavioral1
Sample
3f72f13b6e2369b55ab89ee2cdfadc67_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f72f13b6e2369b55ab89ee2cdfadc67_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Alawar.url
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Alawar.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
HTMLayout.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
HTMLayout.dll
Resource
win10v2004-20241007-en
General
-
Target
HTMLayout.dll
-
Size
61KB
-
MD5
bd9a082b0e2cdcae0ef411c2e0b884e2
-
SHA1
1605d3e4d22519f34617b5c9c4c8d264adf1574d
-
SHA256
0a513706d1653580fd5e4b39c29c1cf243c0de67238eca311775b5560ac9e5d7
-
SHA512
858322e8a36b6c4295ab0472237865d026ebdfaa48892000dc3f248106369a053e1a149f4cb93cbdad7380b1440b2430b5d5c0c9eca166e6e40fb58353af40b6
-
SSDEEP
1536:gChso4vxwM+Wrf7v5F6tp7GPM9ljrwTVumpCwxR9WnvrJijAx2jic:gLXQ8j4p7GPMffwBu8dMcjic
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2252 2220 rundll32.exe 30 PID 2220 wrote to memory of 2252 2220 rundll32.exe 30 PID 2220 wrote to memory of 2252 2220 rundll32.exe 30 PID 2220 wrote to memory of 2252 2220 rundll32.exe 30 PID 2220 wrote to memory of 2252 2220 rundll32.exe 30 PID 2220 wrote to memory of 2252 2220 rundll32.exe 30 PID 2220 wrote to memory of 2252 2220 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\HTMLayout.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\HTMLayout.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2252
-