Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/12/2024, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bedaa9bf8026362ce665a44ccf5b509b968595d5b91532d1225b71a39853ccf4.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_bedaa9bf8026362ce665a44ccf5b509b968595d5b91532d1225b71a39853ccf4.dll
-
Size
188KB
-
MD5
f69312f7ea9632cc9edb62c968bb8c8c
-
SHA1
5aee6c7648d83570711351cb0d9cf40df6c1c7c8
-
SHA256
bedaa9bf8026362ce665a44ccf5b509b968595d5b91532d1225b71a39853ccf4
-
SHA512
ba072fb932629c3fbcf32ca0ca44b29479989c81d5134399f4578e5fe98f3dfb0e6b096c9354fc841c171142b5943702e68e231c8c689b69691d60316969f306
-
SSDEEP
3072:lteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzT9qM:hq7fYIHBZkTB6DWruUCOwjt
Malware Config
Extracted
dridex
22201
103.87.173.60:443
45.32.243.209:8116
207.180.208.54:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2996-1-0x00000000744B0000-0x00000000744E0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1948 2996 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2996 2992 rundll32.exe 31 PID 2992 wrote to memory of 2996 2992 rundll32.exe 31 PID 2992 wrote to memory of 2996 2992 rundll32.exe 31 PID 2992 wrote to memory of 2996 2992 rundll32.exe 31 PID 2992 wrote to memory of 2996 2992 rundll32.exe 31 PID 2992 wrote to memory of 2996 2992 rundll32.exe 31 PID 2992 wrote to memory of 2996 2992 rundll32.exe 31 PID 2996 wrote to memory of 1948 2996 rundll32.exe 32 PID 2996 wrote to memory of 1948 2996 rundll32.exe 32 PID 2996 wrote to memory of 1948 2996 rundll32.exe 32 PID 2996 wrote to memory of 1948 2996 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bedaa9bf8026362ce665a44ccf5b509b968595d5b91532d1225b71a39853ccf4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bedaa9bf8026362ce665a44ccf5b509b968595d5b91532d1225b71a39853ccf4.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2996 -s 3003⤵
- Program crash
PID:1948
-
-