Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 18:59
Behavioral task
behavioral1
Sample
43b708438a5b98e27e2b155b0575a4ca_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
43b708438a5b98e27e2b155b0575a4ca_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
43b708438a5b98e27e2b155b0575a4ca_JaffaCakes118.dll
-
Size
62KB
-
MD5
43b708438a5b98e27e2b155b0575a4ca
-
SHA1
e97e1f95b69594da3047689afdbfa5877ce9fa2a
-
SHA256
e9a6daf5e8801afd5cd18344ba2528de1d7a9037217fe5c809fd9c28da3c1537
-
SHA512
3fcdbfbb4f85ccb44391fbddc4555c2dbaf0e184ce0f4ff405a875f89fa2c180084365678bf59b7123052fccdd8e3a3770684d566fb0547debc8269562b11887
-
SSDEEP
1536:ymupl9pDQA56XS+tcTbr8STIlounDzs1L4oFBlJpa3yXlj+A:mT76XS+tcvr88uc7FBlJpaXA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1784 rundll32.exe Token: SeSecurityPrivilege 1784 rundll32.exe Token: SeTakeOwnershipPrivilege 1784 rundll32.exe Token: SeLoadDriverPrivilege 1784 rundll32.exe Token: SeSystemProfilePrivilege 1784 rundll32.exe Token: SeSystemtimePrivilege 1784 rundll32.exe Token: SeProfSingleProcessPrivilege 1784 rundll32.exe Token: SeIncBasePriorityPrivilege 1784 rundll32.exe Token: SeCreatePagefilePrivilege 1784 rundll32.exe Token: SeBackupPrivilege 1784 rundll32.exe Token: SeRestorePrivilege 1784 rundll32.exe Token: SeShutdownPrivilege 1784 rundll32.exe Token: SeDebugPrivilege 1784 rundll32.exe Token: SeSystemEnvironmentPrivilege 1784 rundll32.exe Token: SeRemoteShutdownPrivilege 1784 rundll32.exe Token: SeUndockPrivilege 1784 rundll32.exe Token: SeManageVolumePrivilege 1784 rundll32.exe Token: 33 1784 rundll32.exe Token: 34 1784 rundll32.exe Token: 35 1784 rundll32.exe Token: 36 1784 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3768 wrote to memory of 1784 3768 rundll32.exe 84 PID 3768 wrote to memory of 1784 3768 rundll32.exe 84 PID 3768 wrote to memory of 1784 3768 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43b708438a5b98e27e2b155b0575a4ca_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43b708438a5b98e27e2b155b0575a4ca_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1784
-