Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 13:10
Behavioral task
behavioral1
Sample
JaffaCakes118_39330ca1b6160d454a891e032075caf0.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_39330ca1b6160d454a891e032075caf0.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_39330ca1b6160d454a891e032075caf0.dll
-
Size
122KB
-
MD5
39330ca1b6160d454a891e032075caf0
-
SHA1
eb05807c8fb7421365552010de0da96a3669d8bd
-
SHA256
8a9bd0a2f1a2245e52967bc7ae50e3b1d8ec039412473c758b09c5646d42921d
-
SHA512
f545ed6f0e735d1195fc004c770b79a1bb3ddbc985a8c3d65ff7489ae29b079168f898f2a7b10893d4a4effdd3cea5a46d8c5ab64ea7008ecdae0d1fbb138fd6
-
SSDEEP
3072:of9xHwm1PXBmXZFeA28pM6EdePl9dehiv80P80Cnp8d6r:wdwaWB28edeP/deUv80P80Ap8A
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 3 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DC95122-4986-43f6-B39C-379EB04D1BA2} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DC95122-4986-43f6-B39C-379EB04D1BA2}\ = "ϵͳÉèÖÃ" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DC95122-4986-43f6-B39C-379EB04D1BA2}\stubpath rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5080 wrote to memory of 640 5080 rundll32.exe 87 PID 5080 wrote to memory of 640 5080 rundll32.exe 87 PID 5080 wrote to memory of 640 5080 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_39330ca1b6160d454a891e032075caf0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_39330ca1b6160d454a891e032075caf0.dll,#12⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
PID:640
-