Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
5213304e424091eac26a0c541bb8419f_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5213304e424091eac26a0c541bb8419f_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
5213304e424091eac26a0c541bb8419f_JaffaCakes118.dll
-
Size
27KB
-
MD5
5213304e424091eac26a0c541bb8419f
-
SHA1
9fd89391f5ed604c20f7d14110c43d57e74a61ff
-
SHA256
9aee7c89706d9e4f3ff41453d2fa1a3e2015797ce26a01fa70638e1012a2b405
-
SHA512
97dd155b709e842460539e3622ba54448afa77b26fd365fefea30eedea0be8d72f0a7d375d098cdfc5b04aebb4054a8ba9b5c029fa397ea51b4e81b241a8da34
-
SSDEEP
384:0B+TB/NFnK9mqZRT+kO3I+x+cR9MNV87bbCXUe5WNoA:0GB/NMU6+kSx+cnMNqXboUe5W+A
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2176 1872 rundll32.exe 84 PID 1872 wrote to memory of 2176 1872 rundll32.exe 84 PID 1872 wrote to memory of 2176 1872 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5213304e424091eac26a0c541bb8419f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5213304e424091eac26a0c541bb8419f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2176
-