Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24/12/2024, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bea4487c48a1972a87710ef1fecf6cf0c356df91ce5954da02a9dd6d3171adc6.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_bea4487c48a1972a87710ef1fecf6cf0c356df91ce5954da02a9dd6d3171adc6.dll
-
Size
188KB
-
MD5
d21c6c110f599b0c704e38241b4d2c98
-
SHA1
316e9f27d9d290b1b7e135a5f0aa96f77b822626
-
SHA256
bea4487c48a1972a87710ef1fecf6cf0c356df91ce5954da02a9dd6d3171adc6
-
SHA512
74c1fc5c19d4804fca4c0c8043c8df1186e8d961bc2b3f1a95efa76cbe5bee47258bb1b20c02bdac1a799f0812102e29975b420b953ea0607ccc9f802933bfb1
-
SSDEEP
3072:wteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz59qM:kq7fYIHBZkTB6DWruUCOwjt
Malware Config
Extracted
dridex
22201
103.87.173.60:443
45.32.243.209:8116
207.180.208.54:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/1116-1-0x0000000074B90000-0x0000000074BC0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2440 1116 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2280 wrote to memory of 1116 2280 rundll32.exe 31 PID 2280 wrote to memory of 1116 2280 rundll32.exe 31 PID 2280 wrote to memory of 1116 2280 rundll32.exe 31 PID 2280 wrote to memory of 1116 2280 rundll32.exe 31 PID 2280 wrote to memory of 1116 2280 rundll32.exe 31 PID 2280 wrote to memory of 1116 2280 rundll32.exe 31 PID 2280 wrote to memory of 1116 2280 rundll32.exe 31 PID 1116 wrote to memory of 2440 1116 rundll32.exe 32 PID 1116 wrote to memory of 2440 1116 rundll32.exe 32 PID 1116 wrote to memory of 2440 1116 rundll32.exe 32 PID 1116 wrote to memory of 2440 1116 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bea4487c48a1972a87710ef1fecf6cf0c356df91ce5954da02a9dd6d3171adc6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bea4487c48a1972a87710ef1fecf6cf0c356df91ce5954da02a9dd6d3171adc6.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 3083⤵
- Program crash
PID:2440
-
-