Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 08:30
Static task
static1
Behavioral task
behavioral1
Sample
1976187ba49108669682ffff927e417a_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1976187ba49108669682ffff927e417a_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
1976187ba49108669682ffff927e417a_JaffaCakes118.dll
-
Size
3.7MB
-
MD5
1976187ba49108669682ffff927e417a
-
SHA1
e75394263922f301ffb9f95621343877258771e1
-
SHA256
9d9259e092e2c0d04668acff35f7dba53ced1037e3389fb457967f50454e85dc
-
SHA512
0a270686db1897d8cb82dcb5eb824162264f5298cd6eb0fc386593566a206f9bc882d5a42efe27910b097735ff9dbf16a63eb6746d4795cf6566cc493c674275
-
SSDEEP
6144:CWqcbsqA/Yiaf9qRGDfTJd9WYXmHPocXz2v/64UgP1toJI:pbsqA/zc4RG5aYIFK64UgPvoS
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\WebCheck = "{E6FB5E20-DE35-11CF-9C87-00AA005127ED}" rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 4604 rundll32.exe 4604 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\exwinnig.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\exwinnig.dll rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4680 4604 WerFault.exe 81 -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32\ = "C:\\Windows\\SysWow64\\exwinnig.dll" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4464 wrote to memory of 4604 4464 rundll32.exe 81 PID 4464 wrote to memory of 4604 4464 rundll32.exe 81 PID 4464 wrote to memory of 4604 4464 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1976187ba49108669682ffff927e417a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1976187ba49108669682ffff927e417a_JaffaCakes118.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:4604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 5723⤵
- Program crash
PID:4680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4604 -ip 46041⤵PID:3732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD527ceae9650286f1ca255294d3375fb0d
SHA147b9be1c038f67f8b60c740e84c1a28bafb1d6c5
SHA2566d298933f5823d00f4632359a008ad0e718fe3040c82dceb1670c826d7eb78aa
SHA512ca31fc2af124b9b06c2b4db7959ab81b00e305d22d4b9f13e82f4f11836c9aeb601f347cce826a7a8e4a35133b984fd38e542a3a85954ba2f8021431153b78d8