Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
40d76a1973bc2c2832f45d748eea4bcc_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
40d76a1973bc2c2832f45d748eea4bcc_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
40d76a1973bc2c2832f45d748eea4bcc_JaffaCakes118.dll
-
Size
3KB
-
MD5
40d76a1973bc2c2832f45d748eea4bcc
-
SHA1
c4c94946348fe50e1b2cd27d6ff330ddb5a61b8b
-
SHA256
7382c3dbe7f2fb0fc4a51156ecd35d30aa68aaaf17ef78ca8031afab54798f70
-
SHA512
9f53921c5bef1bc7a852645ccf0cd4e5932cb4bf61a2d7d69b7a452e64c613cb7acbbf4f4b98d3dea303624250228a4d9868bcbd1a394248ae8c42a59f3855b3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4768 wrote to memory of 3164 4768 rundll32.exe 84 PID 4768 wrote to memory of 3164 4768 rundll32.exe 84 PID 4768 wrote to memory of 3164 4768 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40d76a1973bc2c2832f45d748eea4bcc_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40d76a1973bc2c2832f45d748eea4bcc_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3164
-