Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28/02/2025, 07:56
Behavioral task
behavioral1
Sample
JaffaCakes118_32a4f96cb0b7f5ed141d5ce21ee8daae.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_32a4f96cb0b7f5ed141d5ce21ee8daae.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_32a4f96cb0b7f5ed141d5ce21ee8daae.dll
-
Size
280KB
-
MD5
32a4f96cb0b7f5ed141d5ce21ee8daae
-
SHA1
1b68afc0f997464afcff7aa9d684a3d6c576247b
-
SHA256
181e11317f1319d410d8ccb66270c61ba3144490ba3c37c946509710f305b969
-
SHA512
526e291dd07ceae33b4d6190995a82274e736e53c4552ee069516a703b3d85875a867eb0efb2de4c919e2821f7788535c7e12e8627f4d492931a13d8f6a20801
-
SSDEEP
6144:K2dlG0IYT+fIv6Ah0d3H51f2dlG0IYT+fIv6Ah0d3H516:KgluYT+86AWxrgluYT+86AWxe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2568 2016 rundll32.exe 30 PID 2016 wrote to memory of 2568 2016 rundll32.exe 30 PID 2016 wrote to memory of 2568 2016 rundll32.exe 30 PID 2016 wrote to memory of 2568 2016 rundll32.exe 30 PID 2016 wrote to memory of 2568 2016 rundll32.exe 30 PID 2016 wrote to memory of 2568 2016 rundll32.exe 30 PID 2016 wrote to memory of 2568 2016 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_32a4f96cb0b7f5ed141d5ce21ee8daae.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_32a4f96cb0b7f5ed141d5ce21ee8daae.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2568
-