Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
104s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2025, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7883f7ac13a1d605a1335f37d2b32eb2.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_7883f7ac13a1d605a1335f37d2b32eb2.dll
-
Size
414KB
-
MD5
7883f7ac13a1d605a1335f37d2b32eb2
-
SHA1
5986a869128bbb109817382a57bf6a48b13cf651
-
SHA256
26ef2630ccc7c94cb467d1b7f62367d116c0e967e64a5f504597b1dd9b9dd650
-
SHA512
1003b15a75387d200f3823e6ebd9daaa933950e7090efadb56daf3756c8268fab71fb2bc3f01c60385cb44494d4007f6b1c19ed2928290aa7835bc55cae489a9
-
SSDEEP
3072:IDKpt9sSR0HUHPwZWLnWVfEAzV2IMwTBftZmc+z+f3Q0h:IDgtfRQUHPw06MoV2dwTBlxm8p
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1740 wrote to memory of 4412 1740 rundll32.exe 85 PID 1740 wrote to memory of 4412 1740 rundll32.exe 85 PID 1740 wrote to memory of 4412 1740 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7883f7ac13a1d605a1335f37d2b32eb2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7883f7ac13a1d605a1335f37d2b32eb2.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4412
-