Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 04:43
Static task
static1
Behavioral task
behavioral1
Sample
02e4f979ee7e46fad3e6f2e7c4166450_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
02e4f979ee7e46fad3e6f2e7c4166450_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
02e4f979ee7e46fad3e6f2e7c4166450_JaffaCakes118.dll
-
Size
33KB
-
MD5
02e4f979ee7e46fad3e6f2e7c4166450
-
SHA1
4d74aba8fc5933448f3358c4d4d6011998c89c70
-
SHA256
24eb35fa5017de7ff813390d907046a8dbb52bdbcc5687ea8d2de77ae1bd35ab
-
SHA512
1a45f5b301513e98ba909b9d6ac9e2b8c9dac1d0b8d1c9de5f681b869f2a298fa2862339aabd638a92741ec85617e758b59aff2efe0b67ce0b3d8dba2b37266c
-
SSDEEP
768:re4TH/zy0W5defiInLF5a/nAC+JLyrUUk/K:64fzyD5aiIZ5a/ACCCFF
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 2512 rundll32.exe 2512 rundll32.exe 1272 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSServer = "rundll32.exe C:\\Windows\\system32\\opnnlJDu.dll,#1" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\opnnlJDu.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\opnnlJDu.dll rundll32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{28030FA8-2428-4DE6-B0F3-CE9494E1A412} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{28030FA8-2428-4DE6-B0F3-CE9494E1A412}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{28030FA8-2428-4DE6-B0F3-CE9494E1A412}\InprocServer32\ = "C:\\Windows\\SysWow64\\opnnlJDu.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{28030FA8-2428-4DE6-B0F3-CE9494E1A412}\InprocServer32\ThreadingModel = "Both" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2512 rundll32.exe 2512 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe 1272 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2512 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2512 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2512 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2512 1708 rundll32.exe 84 PID 1708 wrote to memory of 2512 1708 rundll32.exe 84 PID 1708 wrote to memory of 2512 1708 rundll32.exe 84 PID 2512 wrote to memory of 608 2512 rundll32.exe 5 PID 2512 wrote to memory of 1272 2512 rundll32.exe 90 PID 2512 wrote to memory of 1272 2512 rundll32.exe 90 PID 2512 wrote to memory of 1272 2512 rundll32.exe 90
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:608
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\02e4f979ee7e46fad3e6f2e7c4166450_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\02e4f979ee7e46fad3e6f2e7c4166450_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\opnnlJDu.dll,a3⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1272
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD502e4f979ee7e46fad3e6f2e7c4166450
SHA14d74aba8fc5933448f3358c4d4d6011998c89c70
SHA25624eb35fa5017de7ff813390d907046a8dbb52bdbcc5687ea8d2de77ae1bd35ab
SHA5121a45f5b301513e98ba909b9d6ac9e2b8c9dac1d0b8d1c9de5f681b869f2a298fa2862339aabd638a92741ec85617e758b59aff2efe0b67ce0b3d8dba2b37266c