Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 12:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8622058cf310addf596f2d3e24e159e0.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8622058cf310addf596f2d3e24e159e0.dll
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8622058cf310addf596f2d3e24e159e0.dll
-
Size
280KB
-
MD5
8622058cf310addf596f2d3e24e159e0
-
SHA1
913945c1d59a01bbafafed4eb309dba4c578e86c
-
SHA256
4ca7f144aebfa5eca9400066cdaa493fdb3a927e10df8f827c4059977979a0fc
-
SHA512
0f4779d4d74765df11456ab7417328f2aab6d7a0881e1b44a85d75735a6233fb56006d4a25c59e61974d25abf6b6ae39e029b4ad9d7dd52c5f3e661559f19936
-
SSDEEP
3072:cn4cV8gf2u41Z5tKlwKWSLCgOhZpZ+b6v4XbMjX58z1M3TZRrOsageiqR8J/Ckyc:u4y8gOl2Em2Q6wrMlSK6meiWkJH7J
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2752 rundll32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 2720 rundll32.exe 2720 rundll32.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2800 2752 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2720 2664 rundll32.exe 30 PID 2664 wrote to memory of 2720 2664 rundll32.exe 30 PID 2664 wrote to memory of 2720 2664 rundll32.exe 30 PID 2664 wrote to memory of 2720 2664 rundll32.exe 30 PID 2664 wrote to memory of 2720 2664 rundll32.exe 30 PID 2664 wrote to memory of 2720 2664 rundll32.exe 30 PID 2664 wrote to memory of 2720 2664 rundll32.exe 30 PID 2720 wrote to memory of 2752 2720 rundll32.exe 31 PID 2720 wrote to memory of 2752 2720 rundll32.exe 31 PID 2720 wrote to memory of 2752 2720 rundll32.exe 31 PID 2720 wrote to memory of 2752 2720 rundll32.exe 31 PID 2752 wrote to memory of 2800 2752 rundll32mgr.exe 32 PID 2752 wrote to memory of 2800 2752 rundll32mgr.exe 32 PID 2752 wrote to memory of 2800 2752 rundll32mgr.exe 32 PID 2752 wrote to memory of 2800 2752 rundll32mgr.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8622058cf310addf596f2d3e24e159e0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8622058cf310addf596f2d3e24e159e0.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 924⤵
- Loads dropped DLL
- Program crash
PID:2800
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD5d1cf33b3fb134d96475c1e6d3df0f341
SHA126cb92871856fc3e903e432e638cd09f7d64fca5
SHA25652515cc80821a94d293e12fa06b546b90e1c66dcfc7af74beacfb5e97ca2c6fa
SHA5121df8810ab5948813eefef7264c8dfb7b40f8ddb6f7d21ce203c4afef8ef28748fc80d3dc1560c16a05fcae543b8cd1e7655cd6102286accc6865c47b69ad54a1