Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2025, 00:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_61706e573be5f1713984ce5aa940efd0.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_61706e573be5f1713984ce5aa940efd0.dll
-
Size
257KB
-
MD5
61706e573be5f1713984ce5aa940efd0
-
SHA1
62c0818cc5b9cf9398ed3da09831eda269d805d9
-
SHA256
1087bfe8fce8919986085d961266a0b3f114eb119127423921327fb16f007d25
-
SHA512
c9b3ae6978254747a9014d1386ceccd0bfbad17cf0470f4c00fc05841a246d10c74713c7e6f57198b09ea5cbe8c9133b868eca9a9a1d28914852765ab056ada7
-
SSDEEP
6144:ysoA62TjfQ2kbexQ8sd9ICmwt8XP67aaqeO6BAG:5oA62TjfQ2kbexQ8sd9I1wt8f67WyJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2956 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x0010000000023bce-3.dat upx behavioral2/memory/2956-5-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2956-7-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4116 2956 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1948 wrote to memory of 3416 1948 rundll32.exe 82 PID 1948 wrote to memory of 3416 1948 rundll32.exe 82 PID 1948 wrote to memory of 3416 1948 rundll32.exe 82 PID 3416 wrote to memory of 2956 3416 rundll32.exe 83 PID 3416 wrote to memory of 2956 3416 rundll32.exe 83 PID 3416 wrote to memory of 2956 3416 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_61706e573be5f1713984ce5aa940efd0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_61706e573be5f1713984ce5aa940efd0.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 2644⤵
- Program crash
PID:4116
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2956 -ip 29561⤵PID:2064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD540528988aff2d1f61af5ff359434afb5
SHA11100e10d796d6905d3aa25a26e0fa4fb7b23f356
SHA256e458abdf73c87d6e84d3f9ed39483f0662b62d3f722c8db4a011586aa14a18bf
SHA512166601caf50154f66f10d5e1fa3718b2fc12d2a6a8361e4d6766a19e6356da4948784e1dda9b23789f9975f6ccb5b9144b1c8325f63f64c228cee2d7f9704ba7