Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/01/2025, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_07ef3f60fd895473fc0ade1dcb56c9c7.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_07ef3f60fd895473fc0ade1dcb56c9c7.dll
-
Size
227KB
-
MD5
07ef3f60fd895473fc0ade1dcb56c9c7
-
SHA1
aa2868b55b0c707832881d5506ed02633b9b61d1
-
SHA256
2c7a3ac7722902e9e76ccb83ae42f83f932b49ce1fa2037a2dcb834e5864fa59
-
SHA512
91c77bab0decc35368c731647aedbe133fba08feb7d1c7f234035f51a7c3148372e4867443e012f354943052ff78b43f2800fc41607f23c10510715fc0392e17
-
SSDEEP
3072:2CuuNCRs/Pj03pJEEC9ti9pocimFFVW6E1fZim4v5TRRJBYeBTg4vRPW9vc/Bm6a:2CIGPj038tAgFMldWNX+fFfT7h0TD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2820 rundll32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 2908 rundll32.exe 2908 rundll32.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2944 2908 WerFault.exe 30 2900 2820 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2908 2888 rundll32.exe 30 PID 2888 wrote to memory of 2908 2888 rundll32.exe 30 PID 2888 wrote to memory of 2908 2888 rundll32.exe 30 PID 2888 wrote to memory of 2908 2888 rundll32.exe 30 PID 2888 wrote to memory of 2908 2888 rundll32.exe 30 PID 2888 wrote to memory of 2908 2888 rundll32.exe 30 PID 2888 wrote to memory of 2908 2888 rundll32.exe 30 PID 2908 wrote to memory of 2820 2908 rundll32.exe 31 PID 2908 wrote to memory of 2820 2908 rundll32.exe 31 PID 2908 wrote to memory of 2820 2908 rundll32.exe 31 PID 2908 wrote to memory of 2820 2908 rundll32.exe 31 PID 2908 wrote to memory of 2944 2908 rundll32.exe 32 PID 2908 wrote to memory of 2944 2908 rundll32.exe 32 PID 2908 wrote to memory of 2944 2908 rundll32.exe 32 PID 2908 wrote to memory of 2944 2908 rundll32.exe 32 PID 2820 wrote to memory of 2900 2820 rundll32mgr.exe 33 PID 2820 wrote to memory of 2900 2820 rundll32mgr.exe 33 PID 2820 wrote to memory of 2900 2820 rundll32mgr.exe 33 PID 2820 wrote to memory of 2900 2820 rundll32mgr.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_07ef3f60fd895473fc0ade1dcb56c9c7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_07ef3f60fd895473fc0ade1dcb56c9c7.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 924⤵
- Loads dropped DLL
- Program crash
PID:2900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 2283⤵
- Program crash
PID:2944
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD53415fed3f548aa608bea2eec3d58d410
SHA18a6cfec1af581ef12be3babc53a6d4f0993ab63c
SHA25674a8fb4e02cc4e2e191028cada37bf585da2cd5ccb14baa0ecf14a47d03a5879
SHA5121ccf854530e20ac3c942e0f1b213228e0b3834ada6de538fdd93f0ba6e7b68e31b0c5eb10ccc826de9cdf22507ad10b88e40a531b3e0ed7fbe108b126a08aa9b