Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
ec347ff1053d8f1506ab5dc352209206_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec347ff1053d8f1506ab5dc352209206_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
ec347ff1053d8f1506ab5dc352209206_JaffaCakes118.dll
-
Size
220KB
-
MD5
ec347ff1053d8f1506ab5dc352209206
-
SHA1
811f602d6c8ba2accd56270909935939427035c4
-
SHA256
c9132da6ef17c98b8238639f378fe8cac18d501d522ac10ebfe4d700831a7791
-
SHA512
3a292d686de2cb2274a0de53e3da33afa18af4c0a30fa8cf36a5f796f9fb0762ac97aefd18e64360d706cfd7b4fbf5653da7391acf22a19e3961523f21bef804
-
SSDEEP
3072:hEhONXyIaxhjJiJzLDicc8/UbLAbOg3vKYCfiGv9q/67OGlBY5DIJtLm1vy:uUNKhuNCAbJVGKZGlBTvS
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\pmsoarbf = "{EF8FCAC2-32DD-4B27-A2CC-EDCC8F5B7CA5}" rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF8FCAC2-32DD-4B27-A2CC-EDCC8F5B7CA5}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF8FCAC2-32DD-4B27-A2CC-EDCC8F5B7CA5} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF8FCAC2-32DD-4B27-A2CC-EDCC8F5B7CA5}\InProcServer32\ = "C:\\Windows\\pmsoarbf.dll" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2320 wrote to memory of 976 2320 rundll32.exe 84 PID 2320 wrote to memory of 976 2320 rundll32.exe 84 PID 2320 wrote to memory of 976 2320 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec347ff1053d8f1506ab5dc352209206_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec347ff1053d8f1506ab5dc352209206_JaffaCakes118.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:976
-