Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
ec347ff1053d8f1506ab5dc352209206_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec347ff1053d8f1506ab5dc352209206_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
ec347ff1053d8f1506ab5dc352209206_JaffaCakes118.dll
-
Size
220KB
-
MD5
ec347ff1053d8f1506ab5dc352209206
-
SHA1
811f602d6c8ba2accd56270909935939427035c4
-
SHA256
c9132da6ef17c98b8238639f378fe8cac18d501d522ac10ebfe4d700831a7791
-
SHA512
3a292d686de2cb2274a0de53e3da33afa18af4c0a30fa8cf36a5f796f9fb0762ac97aefd18e64360d706cfd7b4fbf5653da7391acf22a19e3961523f21bef804
-
SSDEEP
3072:hEhONXyIaxhjJiJzLDicc8/UbLAbOg3vKYCfiGv9q/67OGlBY5DIJtLm1vy:uUNKhuNCAbJVGKZGlBTvS
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\pmsoarbf = "{2C092E8B-FE8B-4D62-A78B-A3DE325A82DF}" rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2C092E8B-FE8B-4D62-A78B-A3DE325A82DF} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2C092E8B-FE8B-4D62-A78B-A3DE325A82DF}\InProcServer32\ = "C:\\Windows\\pmsoarbf.dll" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2C092E8B-FE8B-4D62-A78B-A3DE325A82DF}\InProcServer32 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2144 2032 rundll32.exe 28 PID 2032 wrote to memory of 2144 2032 rundll32.exe 28 PID 2032 wrote to memory of 2144 2032 rundll32.exe 28 PID 2032 wrote to memory of 2144 2032 rundll32.exe 28 PID 2032 wrote to memory of 2144 2032 rundll32.exe 28 PID 2032 wrote to memory of 2144 2032 rundll32.exe 28 PID 2032 wrote to memory of 2144 2032 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec347ff1053d8f1506ab5dc352209206_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec347ff1053d8f1506ab5dc352209206_JaffaCakes118.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2144
-