Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
f7c7390e02cfa60093ca875eac138311_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f7c7390e02cfa60093ca875eac138311_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
f7c7390e02cfa60093ca875eac138311_JaffaCakes118.dll
-
Size
33KB
-
MD5
f7c7390e02cfa60093ca875eac138311
-
SHA1
2a457e3758437ba53b83682ffb31aab0b16e0ac7
-
SHA256
14a36ffc2deb188712193388b59c00f8a5a5d54b923e7df5d0839796f2eb09cf
-
SHA512
e071f11a34d79c78375f0dbfc6bacf8873d70e6e9d7fb60276bad06daf8fa5dcaf707d19a6424000919bc832e2fa9e61b82bd5e4d2a80de524d1e51ad0895539
-
SSDEEP
384:CsfaKYmTz9Wmn+RDwVXtUAfTvxTP3oxX9BkLyi3BYoyxqFbHqT3CMgIwbKbt:JhNTzsm+SFTZUxtBkp3BYooIu0IdR
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 4912 rundll32.exe 4912 rundll32.exe 1004 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSServer = "rundll32.exe C:\\Windows\\system32\\jkkJbxXP.dll,#1" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\jkkJbxXP.dll rundll32.exe File created C:\Windows\SysWOW64\jkkJbxXP.dll rundll32.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A596175D-BBC7-476A-A152-FBA652B64505}\InprocServer32\ThreadingModel = "Both" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A596175D-BBC7-476A-A152-FBA652B64505} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A596175D-BBC7-476A-A152-FBA652B64505}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A596175D-BBC7-476A-A152-FBA652B64505}\InprocServer32\ = "C:\\Windows\\SysWow64\\jkkJbxXP.dll" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4912 rundll32.exe 4912 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4912 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4912 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4912 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4432 wrote to memory of 4912 4432 rundll32.exe 88 PID 4432 wrote to memory of 4912 4432 rundll32.exe 88 PID 4432 wrote to memory of 4912 4432 rundll32.exe 88 PID 4912 wrote to memory of 616 4912 rundll32.exe 5 PID 4912 wrote to memory of 1004 4912 rundll32.exe 95 PID 4912 wrote to memory of 1004 4912 rundll32.exe 95 PID 4912 wrote to memory of 1004 4912 rundll32.exe 95
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f7c7390e02cfa60093ca875eac138311_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f7c7390e02cfa60093ca875eac138311_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\jkkJbxXP.dll,a3⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5f7c7390e02cfa60093ca875eac138311
SHA12a457e3758437ba53b83682ffb31aab0b16e0ac7
SHA25614a36ffc2deb188712193388b59c00f8a5a5d54b923e7df5d0839796f2eb09cf
SHA512e071f11a34d79c78375f0dbfc6bacf8873d70e6e9d7fb60276bad06daf8fa5dcaf707d19a6424000919bc832e2fa9e61b82bd5e4d2a80de524d1e51ad0895539