Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 12:27
Static task
static1
Behavioral task
behavioral1
Sample
16017353e67868fd3b785aa22db51efb_JaffaCakes118.dll
Resource
win7-20240508-en
General
-
Target
16017353e67868fd3b785aa22db51efb_JaffaCakes118.dll
-
Size
168KB
-
MD5
16017353e67868fd3b785aa22db51efb
-
SHA1
c85f9fca75fab04d74bbece3c180f318d55581dd
-
SHA256
0c262ad9b5f041419149ee032e82abe2f7d06d263de648214c2a484436587d9a
-
SHA512
ac6e5395d17aa97fd0fd2b7748c7525b139a339b9f86e14a714bc57d193af4c825c0584a446830a3fb51d68687be6f193412bab7d3c86efc5e32836454a56586
-
SSDEEP
3072:p+rGFFRCMcyzAAykMPqIaXpZYnvf3gx4wblxLSoIm/H2QKGB2gC:p+rGFFlXAAcqj8nHgfOoIdG
Malware Config
Extracted
dridex
111
173.203.78.138:443
217.160.107.189:6601
77.220.64.150:5037
Signatures
-
resource yara_rule behavioral1/memory/2480-0-0x00000000753D0000-0x00000000753FC000-memory.dmp dridex_ldr behavioral1/memory/2480-3-0x00000000753D0000-0x00000000753FC000-memory.dmp dridex_ldr behavioral1/memory/2480-7-0x00000000753D0000-0x00000000753FC000-memory.dmp dridex_ldr -
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2480 rundll32.exe 6 2480 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2480 2416 rundll32.exe 28 PID 2416 wrote to memory of 2480 2416 rundll32.exe 28 PID 2416 wrote to memory of 2480 2416 rundll32.exe 28 PID 2416 wrote to memory of 2480 2416 rundll32.exe 28 PID 2416 wrote to memory of 2480 2416 rundll32.exe 28 PID 2416 wrote to memory of 2480 2416 rundll32.exe 28 PID 2416 wrote to memory of 2480 2416 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16017353e67868fd3b785aa22db51efb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16017353e67868fd3b785aa22db51efb_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:2480
-