Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 16:14
Behavioral task
behavioral1
Sample
07a2323a683c85dca6ce24ecdc538daf_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
07a2323a683c85dca6ce24ecdc538daf_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
07a2323a683c85dca6ce24ecdc538daf_JaffaCakes118.dll
-
Size
18KB
-
MD5
07a2323a683c85dca6ce24ecdc538daf
-
SHA1
4cb6dc5108a38ec17d3a0b2e43705efe8de1bcee
-
SHA256
8e1f30fb6f050f39576aa89ecef32669971d2d45b6e77fb22f59da72120656c5
-
SHA512
47511e641d84137debdef14213ab57c6bebb288e4db17232f15998f8d97391739edcaec0e2ee21a6a451f53cf2a2672488849e4a22cdd21456b056bf775df14a
-
SSDEEP
384:JVAvSfPYMl0lnya6wZaXYKQx+gGEtRjGJgwR+r9gC:Jmod0ly+WYXkgGVgQ29d
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts rundll32.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00080000000233d0-5.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2968 rundll32.exe -
resource yara_rule behavioral2/memory/1980-0-0x0000000010000000-0x0000000010015000-memory.dmp upx behavioral2/files/0x00080000000233d0-5.dat upx behavioral2/memory/2968-7-0x0000000010000000-0x0000000010015000-memory.dmp upx behavioral2/memory/1980-10-0x0000000010000000-0x0000000010015000-memory.dmp upx behavioral2/memory/2968-12-0x0000000010000000-0x0000000010015000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinDLL (bee.dll) = "rundll32.exe C:\\Windows\\system32\\bee.dll,start" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\bee.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\bee.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1980 rundll32.exe 1980 rundll32.exe 1980 rundll32.exe 1980 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 5104 wrote to memory of 1980 5104 rundll32.exe 80 PID 5104 wrote to memory of 1980 5104 rundll32.exe 80 PID 5104 wrote to memory of 1980 5104 rundll32.exe 80 PID 1980 wrote to memory of 2372 1980 rundll32.exe 81 PID 1980 wrote to memory of 2372 1980 rundll32.exe 81 PID 1980 wrote to memory of 2372 1980 rundll32.exe 81 PID 1980 wrote to memory of 4804 1980 rundll32.exe 83 PID 1980 wrote to memory of 4804 1980 rundll32.exe 83 PID 1980 wrote to memory of 4804 1980 rundll32.exe 83 PID 1980 wrote to memory of 2968 1980 rundll32.exe 85 PID 1980 wrote to memory of 2968 1980 rundll32.exe 85 PID 1980 wrote to memory of 2968 1980 rundll32.exe 85 PID 2372 wrote to memory of 1772 2372 cmd.exe 86 PID 2372 wrote to memory of 1772 2372 cmd.exe 86 PID 2372 wrote to memory of 1772 2372 cmd.exe 86 PID 1980 wrote to memory of 3304 1980 rundll32.exe 87 PID 1980 wrote to memory of 3304 1980 rundll32.exe 87 PID 1980 wrote to memory of 3304 1980 rundll32.exe 87 PID 1772 wrote to memory of 4896 1772 net.exe 88 PID 1772 wrote to memory of 4896 1772 net.exe 88 PID 1772 wrote to memory of 4896 1772 net.exe 88 PID 4804 wrote to memory of 1240 4804 cmd.exe 90 PID 4804 wrote to memory of 1240 4804 cmd.exe 90 PID 4804 wrote to memory of 1240 4804 cmd.exe 90 PID 1240 wrote to memory of 380 1240 net.exe 91 PID 1240 wrote to memory of 380 1240 net.exe 91 PID 1240 wrote to memory of 380 1240 net.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07a2323a683c85dca6ce24ecdc538daf_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07a2323a683c85dca6ce24ecdc538daf_JaffaCakes118.dll,#12⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C net stop "AhnLab Task Scheduler"3⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\net.exenet stop "AhnLab Task Scheduler"4⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AhnLab Task Scheduler"5⤵PID:4896
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C net stop MonSvcNT3⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\net.exenet stop MonSvcNT4⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MonSvcNT5⤵PID:380
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\system32\bee.dll,start3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2968
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uninstall.bat" "3⤵PID:3304
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD59f2d6f4feb29c2b15b53fa198d998edc
SHA1ba516429ade82dbdfac103b4081f11c060938561
SHA2565e8eed071f2b42220ea872ebcb84d33a2e6feefb1676070d544b9cd93927a672
SHA512f8a3058708cc7c5108a63b5842117ea434a521d78468d2cd28c1c39331c159d43719dddd0f4ed10c54d4608279b7170963cee7937de9b7baaa29f60dd1791bf4
-
Filesize
18KB
MD507a2323a683c85dca6ce24ecdc538daf
SHA14cb6dc5108a38ec17d3a0b2e43705efe8de1bcee
SHA2568e1f30fb6f050f39576aa89ecef32669971d2d45b6e77fb22f59da72120656c5
SHA51247511e641d84137debdef14213ab57c6bebb288e4db17232f15998f8d97391739edcaec0e2ee21a6a451f53cf2a2672488849e4a22cdd21456b056bf775df14a