Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
11/03/2025, 18:15
Behavioral task
behavioral1
Sample
JaffaCakes118_66a3465502ceef6514b81cda65af97ea.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_66a3465502ceef6514b81cda65af97ea.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
20118404441.exe
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
20118404441.exe
Resource
win10v2004-20250217-en
General
-
Target
20118404441.exe
-
Size
152KB
-
MD5
76d4be5325ab30c36a17d59058a49784
-
SHA1
94c9e0f84cebe4f418c0e9fd968f8e4b7d5ff300
-
SHA256
15a152afd9e625e11962c53a7a2c67777df7b5f313d1d22f9f16888f41618328
-
SHA512
75f5ce2b0f65755f93fd9d50121c172e209597d781c5b6ec020b2593ec9654f3199e243df5c8c5c5d23daa00fba4e42e186e5ff0e80b9c7c4ca156dae7fee55d
-
SSDEEP
3072:KIp2zGi8A6m7qy2U+moikUvIaLDSGdAjeKEBKLCigD52m:KIp2CE7Ho7UDVdA6rKelT
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System = "RUNDLL32 C:\\Program Files\\Common Files\\WINSOCK.INI,MJ001" 20118404441.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\MJ001.INI 20118404441.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20118404441.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1236 1628 20118404441.exe 30 PID 1628 wrote to memory of 1236 1628 20118404441.exe 30 PID 1628 wrote to memory of 1236 1628 20118404441.exe 30 PID 1628 wrote to memory of 1236 1628 20118404441.exe 30 PID 1628 wrote to memory of 1236 1628 20118404441.exe 30 PID 1628 wrote to memory of 1236 1628 20118404441.exe 30 PID 1628 wrote to memory of 1236 1628 20118404441.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\20118404441.exe"C:\Users\Admin\AppData\Local\Temp\20118404441.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Program Files\MJ001.INI",MJ0012⤵
- System Location Discovery: System Language Discovery
PID:1236
-