Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5da11df8f27e9715daab771845e92c70.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_5da11df8f27e9715daab771845e92c70.dll
-
Size
630KB
-
MD5
5da11df8f27e9715daab771845e92c70
-
SHA1
6a320b4b6151ea57a6672204096184e66cc10d27
-
SHA256
b7eaed0eff01353708317b9e1da0a1be3bfad4e8ed88c7343bb15507ae33fb62
-
SHA512
2781c5d781acd19a73583219b320d5c6b601b38fad50f24d57d9961a463fba67f7e3159613900f14a2f5f223990b1fd2904acb0aae7ec2242e92f4ddc025a582
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0o:jDgtfRQUHPw06MoV2nwTBlhm8A
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2196 2264 rundll32.exe 87 PID 2264 wrote to memory of 2196 2264 rundll32.exe 87 PID 2264 wrote to memory of 2196 2264 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5da11df8f27e9715daab771845e92c70.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5da11df8f27e9715daab771845e92c70.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2196
-