Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/12/2024, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e97034168d42cbce890d0e282b0dfd08bf69793c42a7a72d32940f60f805d1a8.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_e97034168d42cbce890d0e282b0dfd08bf69793c42a7a72d32940f60f805d1a8.dll
-
Size
188KB
-
MD5
d8d75c1e1c872ae0daa2861918b5047f
-
SHA1
f9b6ceea58812624977d37a219eff99e1f32f52c
-
SHA256
e97034168d42cbce890d0e282b0dfd08bf69793c42a7a72d32940f60f805d1a8
-
SHA512
a5d000c260dd6fe83bbe3f7d76abe5f06875ac6f466cd4865f36d08c4cfa031b2052e90855434757958cd0fc7af8f54982dcb7f065eca686d349265631c052d2
-
SSDEEP
3072:hteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzj9qM:tq7fYIHBZkTB6DWruUCOwjt
Malware Config
Extracted
dridex
22201
103.87.173.60:443
45.32.243.209:8116
207.180.208.54:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2300-1-0x0000000074640000-0x0000000074670000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2384 2300 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2300 3044 rundll32.exe 30 PID 3044 wrote to memory of 2300 3044 rundll32.exe 30 PID 3044 wrote to memory of 2300 3044 rundll32.exe 30 PID 3044 wrote to memory of 2300 3044 rundll32.exe 30 PID 3044 wrote to memory of 2300 3044 rundll32.exe 30 PID 3044 wrote to memory of 2300 3044 rundll32.exe 30 PID 3044 wrote to memory of 2300 3044 rundll32.exe 30 PID 2300 wrote to memory of 2384 2300 rundll32.exe 32 PID 2300 wrote to memory of 2384 2300 rundll32.exe 32 PID 2300 wrote to memory of 2384 2300 rundll32.exe 32 PID 2300 wrote to memory of 2384 2300 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e97034168d42cbce890d0e282b0dfd08bf69793c42a7a72d32940f60f805d1a8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e97034168d42cbce890d0e282b0dfd08bf69793c42a7a72d32940f60f805d1a8.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 3003⤵
- Program crash
PID:2384
-
-