Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
3fb6f384f9b9cab5feee57186aefe46a_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3fb6f384f9b9cab5feee57186aefe46a_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
3fb6f384f9b9cab5feee57186aefe46a_JaffaCakes118.dll
-
Size
572KB
-
MD5
3fb6f384f9b9cab5feee57186aefe46a
-
SHA1
1b778d334722df4fdbecfe81ee7d21e72449b963
-
SHA256
a9d65082335f69c343714b4b0b9284beea124c605a29c89de90494c74f901e62
-
SHA512
f49d74039cd6c93b482904c52778b7a879978a4a9c1c462a28c68c0eb31143697c47da3a281aefd2092243987e4113b6d611fa86366510e5b662a38fe913bf2d
-
SSDEEP
12288:yGtm9ygUwr0fCOA18xZUM3WBMF78CORwK8SFnoMBC+dX9:89ygLr6COA1AZUM3WCN8vV8SnzC+3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2324 wrote to memory of 1100 2324 rundll32.exe 28 PID 2324 wrote to memory of 1100 2324 rundll32.exe 28 PID 2324 wrote to memory of 1100 2324 rundll32.exe 28 PID 2324 wrote to memory of 1100 2324 rundll32.exe 28 PID 2324 wrote to memory of 1100 2324 rundll32.exe 28 PID 2324 wrote to memory of 1100 2324 rundll32.exe 28 PID 2324 wrote to memory of 1100 2324 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3fb6f384f9b9cab5feee57186aefe46a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3fb6f384f9b9cab5feee57186aefe46a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1100
-