Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2025, 05:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_31e7cb595610232b2fa89419dc18a8d7.dll
Resource
win7-20240903-en
Errors
General
-
Target
JaffaCakes118_31e7cb595610232b2fa89419dc18a8d7.dll
-
Size
385KB
-
MD5
31e7cb595610232b2fa89419dc18a8d7
-
SHA1
34e01d2d614524572d5b3206d6c5004bafd71008
-
SHA256
83158401f1e2c620df1771471c1fd9472964ec4eaab34ff0d135edaac0cf3f64
-
SHA512
ef3712578408c632bd6cb6288445b260d42cb73f55ffae409e2502b2801f2e97216b2524058325edaf15b3e0bbe50baf9b81dfde435efa40a520050764d77f5a
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0E:jDgtfRQUHPw06MoV2nwTBlhm88
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3592 wrote to memory of 3772 3592 rundll32.exe 86 PID 3592 wrote to memory of 3772 3592 rundll32.exe 86 PID 3592 wrote to memory of 3772 3592 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31e7cb595610232b2fa89419dc18a8d7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31e7cb595610232b2fa89419dc18a8d7.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3772
-