Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 23:00
Behavioral task
behavioral1
Sample
JaffaCakes118_61d910e2be17b85f9e13d80ce9846910.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_61d910e2be17b85f9e13d80ce9846910.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_61d910e2be17b85f9e13d80ce9846910.dll
-
Size
122KB
-
MD5
61d910e2be17b85f9e13d80ce9846910
-
SHA1
c0f3048157ae07791a23d46147dc24df757108f2
-
SHA256
85b1a62a801f7e6dd3b21196c6aa0ce36a08170612473e0a35f5d957a6c12df1
-
SHA512
8f8e68d239befb9eb731d82670724c057c87b6e969bd579507eebea04b2b7b0ed4a910c3276a8b483e5b68dd3adf6a9e7a078df8fd56317e1e7a411ecb78492b
-
SSDEEP
3072:of9xHwm1PXBmXZFeA28pM6EdePl9dehiv80P80Cnp8d6e:wdwaWB28edeP/deUv80P80Ap8B
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 3 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{49663ABA-4F88-44b9-8E98-E0C8B5D2B7A6} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{49663ABA-4F88-44b9-8E98-E0C8B5D2B7A6}\ = "ϵͳÉèÖÃ" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{49663ABA-4F88-44b9-8E98-E0C8B5D2B7A6}\stubpath rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1584 wrote to memory of 1896 1584 rundll32.exe 86 PID 1584 wrote to memory of 1896 1584 rundll32.exe 86 PID 1584 wrote to memory of 1896 1584 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_61d910e2be17b85f9e13d80ce9846910.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_61d910e2be17b85f9e13d80ce9846910.dll,#12⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
PID:1896
-