Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/01/2025, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_051209722262ed16380e025b103fd110.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_051209722262ed16380e025b103fd110.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_051209722262ed16380e025b103fd110.dll
-
Size
196KB
-
MD5
051209722262ed16380e025b103fd110
-
SHA1
015011637f832a9ef17720e5f73b2aabd40c3fab
-
SHA256
26e5b7d451e82364234a5c5fd4947a2b6e4235cb507d6249932d0755e68df317
-
SHA512
4813ee767465b12aac9f495872952983f58e1fba97bba4c54d11f246873c224f93e8318e337db72ac771efa9b04dbe5dbd4cb0b5b855e7c1b03fb2add7c298b4
-
SSDEEP
3072:3bdF7BDeGF3b7IlBwpTWl+84+W8NkWjfArSEp57C+VzQJ+mBBwJkjGgX:3JFnb8lBwlR8W8SmfArS2CcmHMQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3868 uVoPhHEgm -
Program crash 1 IoCs
pid pid_target Process procid_target 2972 3868 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1792 wrote to memory of 3508 1792 rundll32.exe 83 PID 1792 wrote to memory of 3508 1792 rundll32.exe 83 PID 1792 wrote to memory of 3508 1792 rundll32.exe 83 PID 3508 wrote to memory of 3868 3508 rundll32.exe 84 PID 3508 wrote to memory of 3868 3508 rundll32.exe 84 PID 3508 wrote to memory of 3868 3508 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_051209722262ed16380e025b103fd110.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_051209722262ed16380e025b103fd110.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\uVoPhHEgm"uVoPhHEgm"3⤵
- Executes dropped EXE
PID:3868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 1964⤵
- Program crash
PID:2972
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3868 -ip 38681⤵PID:4216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD569b702ec5b32f2cf025e9961bee612a0
SHA1e4ceb28f770d0397a64492d0e400b56e29beb898
SHA2568801635867cae2bb98c1c080d3a1c007a66d88be1532534cb58293f333510e3a
SHA51231a239d36263d8c7032848c1be844a455208e330ddf62dfe080a74901ff64838e6f3ce6e5efc5f8a85a69c257471fea3d30feef795440cba4991662393ae4182