Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe
-
Size
92KB
-
MD5
ed1c150417809fc543d9c76a0c188c10
-
SHA1
e344c479f5048d2097e21bf20508daea10dc4d0c
-
SHA256
bcb17afbe86af3cecca26895528cddccd84db5f84e81f45bdcc54de8cbeb8eb7
-
SHA512
9d6630805b592af1fc5069faad82b3015f35b86a14b3efe913ee6cb21ca8d395bfaf6e5dd372a83990862920b65175c14e7aef86933e618c6d05ca3249852013
-
SSDEEP
1536:Q83e9btz0DRwG7m+0XOPffculrRFXDgShVQ9MX9CwAHhcm+kZm+p:DWpz0DyGajOTlrRGi90/m+p
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 1628 rundll32.exe 1628 rundll32.exe 1628 rundll32.exe 1628 rundll32.exe 2440 rundll32.exe 2440 rundll32.exe 2440 rundll32.exe 2440 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Hzofam = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\KBLSAca.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1628 rundll32.exe 1628 rundll32.exe 1628 rundll32.exe 1628 rundll32.exe 1628 rundll32.exe 1628 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2144 wrote to memory of 1628 2144 ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe 28 PID 2144 wrote to memory of 1628 2144 ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe 28 PID 2144 wrote to memory of 1628 2144 ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe 28 PID 2144 wrote to memory of 1628 2144 ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe 28 PID 2144 wrote to memory of 1628 2144 ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe 28 PID 2144 wrote to memory of 1628 2144 ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe 28 PID 2144 wrote to memory of 1628 2144 ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe 28 PID 1628 wrote to memory of 2440 1628 rundll32.exe 29 PID 1628 wrote to memory of 2440 1628 rundll32.exe 29 PID 1628 wrote to memory of 2440 1628 rundll32.exe 29 PID 1628 wrote to memory of 2440 1628 rundll32.exe 29 PID 1628 wrote to memory of 2440 1628 rundll32.exe 29 PID 1628 wrote to memory of 2440 1628 rundll32.exe 29 PID 1628 wrote to memory of 2440 1628 rundll32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\KBLSAca.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\KBLSAca.dll",iep3⤵
- Loads dropped DLL
PID:2440
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5c9036c5b09ca3dd0571fb5a3beef8345
SHA18f124031a90c035b3733d4aafb67ca52386b4ce3
SHA256d6558c1fff3c2499c70e5e9a9ea34370f0f04b502f1ea52e31690daa68b70c97
SHA512ba129328b7aa3867f70ab73b124b5a992db99b362a5862c47995300fedf3b910f05484b2645b954cb3acd8fc626d8008ac21efb7db607833c73f00fc841775ab