Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 18:59
Behavioral task
behavioral1
Sample
43b708438a5b98e27e2b155b0575a4ca_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
43b708438a5b98e27e2b155b0575a4ca_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
43b708438a5b98e27e2b155b0575a4ca_JaffaCakes118.dll
-
Size
62KB
-
MD5
43b708438a5b98e27e2b155b0575a4ca
-
SHA1
e97e1f95b69594da3047689afdbfa5877ce9fa2a
-
SHA256
e9a6daf5e8801afd5cd18344ba2528de1d7a9037217fe5c809fd9c28da3c1537
-
SHA512
3fcdbfbb4f85ccb44391fbddc4555c2dbaf0e184ce0f4ff405a875f89fa2c180084365678bf59b7123052fccdd8e3a3770684d566fb0547debc8269562b11887
-
SSDEEP
1536:ymupl9pDQA56XS+tcTbr8STIlounDzs1L4oFBlJpa3yXlj+A:mT76XS+tcvr88uc7FBlJpaXA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2740 rundll32.exe Token: SeSecurityPrivilege 2740 rundll32.exe Token: SeTakeOwnershipPrivilege 2740 rundll32.exe Token: SeLoadDriverPrivilege 2740 rundll32.exe Token: SeSystemProfilePrivilege 2740 rundll32.exe Token: SeSystemtimePrivilege 2740 rundll32.exe Token: SeProfSingleProcessPrivilege 2740 rundll32.exe Token: SeIncBasePriorityPrivilege 2740 rundll32.exe Token: SeCreatePagefilePrivilege 2740 rundll32.exe Token: SeBackupPrivilege 2740 rundll32.exe Token: SeRestorePrivilege 2740 rundll32.exe Token: SeShutdownPrivilege 2740 rundll32.exe Token: SeDebugPrivilege 2740 rundll32.exe Token: SeSystemEnvironmentPrivilege 2740 rundll32.exe Token: SeRemoteShutdownPrivilege 2740 rundll32.exe Token: SeUndockPrivilege 2740 rundll32.exe Token: SeManageVolumePrivilege 2740 rundll32.exe Token: 33 2740 rundll32.exe Token: 34 2740 rundll32.exe Token: 35 2740 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2740 2768 rundll32.exe 30 PID 2768 wrote to memory of 2740 2768 rundll32.exe 30 PID 2768 wrote to memory of 2740 2768 rundll32.exe 30 PID 2768 wrote to memory of 2740 2768 rundll32.exe 30 PID 2768 wrote to memory of 2740 2768 rundll32.exe 30 PID 2768 wrote to memory of 2740 2768 rundll32.exe 30 PID 2768 wrote to memory of 2740 2768 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43b708438a5b98e27e2b155b0575a4ca_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43b708438a5b98e27e2b155b0575a4ca_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2740
-