Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
104s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2025, 14:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8751ffb8cf222ab81161df6bfc08c2f0.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_8751ffb8cf222ab81161df6bfc08c2f0.dll
-
Size
204KB
-
MD5
8751ffb8cf222ab81161df6bfc08c2f0
-
SHA1
84d324815968276c2e3c07fa90070c19fe8a0b34
-
SHA256
a3d060addde81e53c12ead210925c53cfb78cb92958260bf4454727940adf0d8
-
SHA512
a69eb180d51d440a5b2e8786c8b8ae9412769f58763e97eac172873af0adc77523405123d870f4e18202f1bcb8c20544b46b74e915ffb77a597298d044a5ecb3
-
SSDEEP
3072:uOBOLWXivHYMzv2HvP5YeBTEEP2831Vr/rF8QOSta7We559tZ3hsJNhQeCUChSxy:uOp8HpzdQOStKVbxFM4qiu7OKoa32
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1880 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x00050000000229c8-3.dat upx behavioral2/memory/1880-4-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/1880-7-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1604 1880 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3472 wrote to memory of 3884 3472 rundll32.exe 86 PID 3472 wrote to memory of 3884 3472 rundll32.exe 86 PID 3472 wrote to memory of 3884 3472 rundll32.exe 86 PID 3884 wrote to memory of 1880 3884 rundll32.exe 87 PID 3884 wrote to memory of 1880 3884 rundll32.exe 87 PID 3884 wrote to memory of 1880 3884 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8751ffb8cf222ab81161df6bfc08c2f0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8751ffb8cf222ab81161df6bfc08c2f0.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 2724⤵
- Program crash
PID:1604
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1880 -ip 18801⤵PID:5072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD54ac46f9b1cf2510e27caaf559aba2d87
SHA10aecafb73e3554ece3d8315197ba3db63cb54c17
SHA256461ded20219270124b6d2f636f7b07b2847c35355517657f01a19e472e270b63
SHA5126b8bd6b72f9a78e900e852466dcf60df4ac7e43a041fc138538fa2368ab4763bf04e45a2aff81d3a718919c18bcd2ef46c7bdb7992fdb366ca569791f4174a0a