Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
104s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_861b36068788838eb29dfbacc3585834.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_861b36068788838eb29dfbacc3585834.dll
-
Size
280KB
-
MD5
861b36068788838eb29dfbacc3585834
-
SHA1
5bdd8ce1d545a9e8fe4c857fcc540b7c596d5aac
-
SHA256
5357cada9b5bd0c4787ecfd84b6af9b6204d0cb9db93601f6244726e6dee4afd
-
SHA512
03e0a42ee7f40a7ee93a714fc6b191481b5ebf58bf28782847a2daf18a9c4d034bf338d811930a324302cde7d4d8d7a8c064b0bfcb05eeac9b4534879c5d1a92
-
SSDEEP
3072:bdcQ2ZNMSQvbajUTUItjT68+xQ2YBTsUZa3/YHV/j+3UgE8GFPj5IFUNDHSZ9crj:bATSOjUQK9BTso+K+EH8264MK8I
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5256 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x00050000000227cb-3.dat upx behavioral2/memory/5256-5-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/5256-7-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 5236 5256 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5060 wrote to memory of 632 5060 rundll32.exe 84 PID 5060 wrote to memory of 632 5060 rundll32.exe 84 PID 5060 wrote to memory of 632 5060 rundll32.exe 84 PID 632 wrote to memory of 5256 632 rundll32.exe 85 PID 632 wrote to memory of 5256 632 rundll32.exe 85 PID 632 wrote to memory of 5256 632 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_861b36068788838eb29dfbacc3585834.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_861b36068788838eb29dfbacc3585834.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5256 -s 2644⤵
- Program crash
PID:5236
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5256 -ip 52561⤵PID:216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD512d840fc0b79a745c013e73c4c470467
SHA1f47b3c28974d6199e596c365f5e7161656480100
SHA2567ee9098ea2bc30eaea20eceb5e8cda620772c4ba2d7d6945e34ea93fb6054ccb
SHA512de5f3cb695f1a10d897968668ea403721e09f9c66db796d932b8152edb1681dbac777efb63a2cff9d81380d09452f90470a8b77363a99f21421b9ff61fcb930a