Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
116s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 19:39
Behavioral task
behavioral1
Sample
JaffaCakes118_3b230e3fded925e69be9d1c0daf3c430.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3b230e3fded925e69be9d1c0daf3c430.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_3b230e3fded925e69be9d1c0daf3c430.dll
-
Size
118KB
-
MD5
3b230e3fded925e69be9d1c0daf3c430
-
SHA1
976faa52fa7f29c5c849f6e464c0f23044a037ee
-
SHA256
5177a542f9792140b7b58e14b71f47832f7580599b132be7a609a07775482141
-
SHA512
699b35910b9734baf18da86fe2b4442a983c44512569da88cdf03be644960441ccc3392a5abb50e314003c7aa5c7eac1ccd76107809b813f45f7d319b02c2780
-
SSDEEP
3072:ria3xcjt/FTpKv56WE2MzCe5AT8rJX3b:ma3xcjt/d65pZez5AAZL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3900 wrote to memory of 4060 3900 rundll32.exe 86 PID 3900 wrote to memory of 4060 3900 rundll32.exe 86 PID 3900 wrote to memory of 4060 3900 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b230e3fded925e69be9d1c0daf3c430.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b230e3fded925e69be9d1c0daf3c430.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4060
-