Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2024, 21:27

General

  • Target

    53d0e4352033b5866653cec34a8b048c_JaffaCakes118.dll

  • Size

    84KB

  • MD5

    53d0e4352033b5866653cec34a8b048c

  • SHA1

    b11f768abae78e82ac83369a7a9e212200b9ad1e

  • SHA256

    ab2395fad72822515591e86f85797e3933553a86967c92e020912013210484c1

  • SHA512

    a6a49a5a3f74ce65aef778d33fc4f8bbdc0e4239bb28192c35080ad88e5d5dca0e32034a83eed2a6a98e0fcb15685a904431fb34f7ffc2bdcfc30e9cfcd5e567

  • SSDEEP

    1536:FR3p0GaRad1Yq6n4SFb7+arPMOdaxtYQ7:FR3p0PDdMOcxtY

Score
3/10

Malware Config

Signatures

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\53d0e4352033b5866653cec34a8b048c_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3800
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\53d0e4352033b5866653cec34a8b048c_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5096
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 560
        3⤵
        • Program crash
        PID:2944
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 852
        3⤵
        • Program crash
        PID:3492
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5096 -ip 5096
    1⤵
      PID:4220
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5096 -ip 5096
      1⤵
        PID:3660

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/5096-0-0x0000000010000000-0x0000000010017000-memory.dmp

        Filesize

        92KB