Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2024, 20:51

General

  • Target

    367e8a38f25d15954825f1f8722734e6_JaffaCakes118.dll

  • Size

    262KB

  • MD5

    367e8a38f25d15954825f1f8722734e6

  • SHA1

    ff74479bb5252a924b9d7b7e75f23cf2a01f331a

  • SHA256

    1299da6388fa9cc02fcadd5a6dba0805bcddba0c4ad1a1ea2ad92fadddb7c139

  • SHA512

    9577514cbfb2ef19b37b894a52251cbd3eb3e470f645bbf5464c9753d3b2b512203e67ecccda46b7a8439b4b1da8e66641122e676c625340a53f506962913c04

  • SSDEEP

    3072:l2CYUE9J7yX8LVxQbqHVOhB+PVG63Qv+hp2mZKT6Rtktcgx:l2CYUi+sLVW4VOy+6AmZjuq6

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 34 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\367e8a38f25d15954825f1f8722734e6_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\367e8a38f25d15954825f1f8722734e6_JaffaCakes118.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads