Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/01/2025, 16:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5cf81624d2492b71ae0f3d298eab1bab.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_5cf81624d2492b71ae0f3d298eab1bab.dll
-
Size
572KB
-
MD5
5cf81624d2492b71ae0f3d298eab1bab
-
SHA1
a0e9537f9bcd84515c26c796cb5f4230b93cc6b6
-
SHA256
7e8108814cece759ca212c07585ac24abccacecf96c9527ab457b47642261099
-
SHA512
fd9a71f09eea3ce1d810b50e637a2bf52b0bacfa0746bdc6437402e973583cb0a74d92e9efde8e10bf567c29fb06df834661819bb9f9d256db8245be0f7be3a2
-
SSDEEP
12288:aehnaNPpSVZmNxRCwnwm3W3OHIIf5fIBlcjOQ/qqq9jW3+xkt:aeh0PpS6NxNnwYeOHXuBLQMVxkt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2568 rundll32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 2848 rundll32.exe 2848 rundll32.exe 836 WerFault.exe 836 WerFault.exe 836 WerFault.exe 836 WerFault.exe 836 WerFault.exe 836 WerFault.exe 836 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 836 2568 WerFault.exe 29 268 2848 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2848 1640 rundll32.exe 28 PID 1640 wrote to memory of 2848 1640 rundll32.exe 28 PID 1640 wrote to memory of 2848 1640 rundll32.exe 28 PID 1640 wrote to memory of 2848 1640 rundll32.exe 28 PID 1640 wrote to memory of 2848 1640 rundll32.exe 28 PID 1640 wrote to memory of 2848 1640 rundll32.exe 28 PID 1640 wrote to memory of 2848 1640 rundll32.exe 28 PID 2848 wrote to memory of 2568 2848 rundll32.exe 29 PID 2848 wrote to memory of 2568 2848 rundll32.exe 29 PID 2848 wrote to memory of 2568 2848 rundll32.exe 29 PID 2848 wrote to memory of 2568 2848 rundll32.exe 29 PID 2568 wrote to memory of 836 2568 rundll32mgr.exe 30 PID 2568 wrote to memory of 836 2568 rundll32mgr.exe 30 PID 2568 wrote to memory of 836 2568 rundll32mgr.exe 30 PID 2568 wrote to memory of 836 2568 rundll32mgr.exe 30 PID 2848 wrote to memory of 268 2848 rundll32.exe 31 PID 2848 wrote to memory of 268 2848 rundll32.exe 31 PID 2848 wrote to memory of 268 2848 rundll32.exe 31 PID 2848 wrote to memory of 268 2848 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5cf81624d2492b71ae0f3d298eab1bab.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5cf81624d2492b71ae0f3d298eab1bab.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 924⤵
- Loads dropped DLL
- Program crash
PID:836
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 2243⤵
- Program crash
PID:268
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD5d1cf33b3fb134d96475c1e6d3df0f341
SHA126cb92871856fc3e903e432e638cd09f7d64fca5
SHA25652515cc80821a94d293e12fa06b546b90e1c66dcfc7af74beacfb5e97ca2c6fa
SHA5121df8810ab5948813eefef7264c8dfb7b40f8ddb6f7d21ce203c4afef8ef28748fc80d3dc1560c16a05fcae543b8cd1e7655cd6102286accc6865c47b69ad54a1