Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09/01/2025, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_cb359b177605b936f7fdffa64869bdf9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_cb359b177605b936f7fdffa64869bdf9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/djxkzboezod.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/djxkzboezod.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/djxkzboezod.dll
-
Size
20KB
-
MD5
eeda791c434b928af71754cab0af6d83
-
SHA1
16e667ab08125cc9a8b3f1fb7c9b2bac70729c06
-
SHA256
863bece4d142934ffc1136b2eb98938d5865e4f31608a6392ed91575bee6667a
-
SHA512
0fcc9e14a04047b8a4681bcca0de688391981da7269bdbe3d76dc8f74f2ed29d07eeb4c6dca78d4e3b7b91ace1be6b8a80de4a47f8206f6b9d7c3ba2b784d79d
-
SSDEEP
384:vRWjYF3F4+t6WonZZ1bWHZ+NmsNK24DBb6XCtO:vkjUV5wZlS4mjfx6ytO
Malware Config
Extracted
bitrat
1.38
dothra.duckdns.org:6703
-
communication_password
653bb8a00acdfd76c124918115156da1
-
tor_process
tor
Signatures
-
Bitrat family
-
Program crash 1 IoCs
pid pid_target Process procid_target 2636 2824 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1492 wrote to memory of 2604 1492 rundll32.exe 30 PID 1492 wrote to memory of 2604 1492 rundll32.exe 30 PID 1492 wrote to memory of 2604 1492 rundll32.exe 30 PID 1492 wrote to memory of 2604 1492 rundll32.exe 30 PID 1492 wrote to memory of 2604 1492 rundll32.exe 30 PID 1492 wrote to memory of 2604 1492 rundll32.exe 30 PID 1492 wrote to memory of 2604 1492 rundll32.exe 30 PID 2604 wrote to memory of 2824 2604 rundll32.exe 31 PID 2604 wrote to memory of 2824 2604 rundll32.exe 31 PID 2604 wrote to memory of 2824 2604 rundll32.exe 31 PID 2604 wrote to memory of 2824 2604 rundll32.exe 31 PID 2604 wrote to memory of 2824 2604 rundll32.exe 31 PID 2604 wrote to memory of 2824 2604 rundll32.exe 31 PID 2604 wrote to memory of 2824 2604 rundll32.exe 31 PID 2604 wrote to memory of 2824 2604 rundll32.exe 31 PID 2604 wrote to memory of 2824 2604 rundll32.exe 31 PID 2604 wrote to memory of 2824 2604 rundll32.exe 31 PID 2604 wrote to memory of 2824 2604 rundll32.exe 31 PID 2604 wrote to memory of 2824 2604 rundll32.exe 31 PID 2604 wrote to memory of 2824 2604 rundll32.exe 31 PID 2604 wrote to memory of 2824 2604 rundll32.exe 31 PID 2604 wrote to memory of 2824 2604 rundll32.exe 31 PID 2824 wrote to memory of 2636 2824 rundll32.exe 32 PID 2824 wrote to memory of 2636 2824 rundll32.exe 32 PID 2824 wrote to memory of 2636 2824 rundll32.exe 32 PID 2824 wrote to memory of 2636 2824 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\djxkzboezod.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\djxkzboezod.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\djxkzboezod.dll,#13⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 1964⤵
- Program crash
PID:2636
-
-
-