Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/03/2025, 01:12
Behavioral task
behavioral1
Sample
JaffaCakes118_625f6a84a0e2e04eb67381d02d714750.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_625f6a84a0e2e04eb67381d02d714750.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_625f6a84a0e2e04eb67381d02d714750.dll
-
Size
133KB
-
MD5
625f6a84a0e2e04eb67381d02d714750
-
SHA1
e5bf9463b462ebc46380bbfdc98fb14032bdf360
-
SHA256
00e147b69489f9bf20cfb7eb3763d1c18cd096cdae234594279e70a1a6de9fb1
-
SHA512
bc8502073d4073b1a232f563f2e41b8c98660620dcdc3ff35d451fd33606cfa4f692b56f5e8b0e688aa1d70a293ecb16fbb0fa4821c749c5474ecbd764e87e6a
-
SSDEEP
3072:of9xHwm1PXBmXZFeA28pM6EdePl9dehiv80P80Cnp8d6:wdwaWB28edeP/deUv80P80Ap8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2088 1788 rundll32.exe 28 PID 1788 wrote to memory of 2088 1788 rundll32.exe 28 PID 1788 wrote to memory of 2088 1788 rundll32.exe 28 PID 1788 wrote to memory of 2088 1788 rundll32.exe 28 PID 1788 wrote to memory of 2088 1788 rundll32.exe 28 PID 1788 wrote to memory of 2088 1788 rundll32.exe 28 PID 1788 wrote to memory of 2088 1788 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_625f6a84a0e2e04eb67381d02d714750.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_625f6a84a0e2e04eb67381d02d714750.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2088
-