Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2024, 19:52
Behavioral task
behavioral1
Sample
c4210a26cc355b64ed5734df960b2b78_JaffaCakes118.dll
Resource
win7-20240903-en
12 signatures
150 seconds
General
-
Target
c4210a26cc355b64ed5734df960b2b78_JaffaCakes118.dll
-
Size
209KB
-
MD5
c4210a26cc355b64ed5734df960b2b78
-
SHA1
d0716e4ee39e2caefc5844b35143a4d7e38ae4ec
-
SHA256
838d2f9aa24bb10a81b1d750e116c443100f2be1093fc138e31621fd5911c460
-
SHA512
f000f29368d3c77c14c901573995b05b3b252134af1a16c01e32e1bfb3d35195f1d220f380f7bf887851495c001d3b56dd86895ef608dac9e43f32f0da777f43
-
SSDEEP
6144:T/q32rRjPhKuDkkLjp+ScgBKozpJ1XVSGuRq9M:myR9rIMHZBKI/XV2M
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1032-0-0x0000000000400000-0x0000000000452000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2796 1032 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2656 wrote to memory of 1032 2656 rundll32.exe 83 PID 2656 wrote to memory of 1032 2656 rundll32.exe 83 PID 2656 wrote to memory of 1032 2656 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c4210a26cc355b64ed5734df960b2b78_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c4210a26cc355b64ed5734df960b2b78_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 5683⤵
- Program crash
PID:2796
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1032 -ip 10321⤵PID:4892