Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 11:28
Behavioral task
behavioral1
Sample
1b1ef0b9efe97081aee01e05745b9a1e_JaffaCakes118.dll
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
1b1ef0b9efe97081aee01e05745b9a1e_JaffaCakes118.dll
-
Size
663KB
-
MD5
1b1ef0b9efe97081aee01e05745b9a1e
-
SHA1
e218f4563c24e74bdcac0048fa50e12314bc4663
-
SHA256
89bb411a9f29ffa858c2eeea1c62394fb0779166e72ac46654260fa9dc6fc41a
-
SHA512
ae5fe02c771ac0d48e113e3a6b7cf56a77e6fc22de3f9e817b8c70f078d0b9ba2237a13023613e97b786c6eb20d3bf22ecd9ab39cda5e9821153fcf500f9568f
-
SSDEEP
12288:dYaeQZFg9Y4/xeythsZo3nEpCkMRoSDtz:9dkd5eZCEpCk8
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4684-1-0x0000000001F90000-0x0000000002038000-memory.dmp upx behavioral2/memory/4684-0-0x0000000001F90000-0x0000000002038000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{960571B5-9178-4F29-B366-0585C526BAB0}\ regsvr32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{960571B5-9178-4F29-B366-0585C526BAB0} regsvr32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\romanime.log regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{960571B5-9178-4F29-B366-0585C526BAB0} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\1b1ef0b9efe97081aee01e05745b9a1e_JaffaCakes118.TobjXQDBHO\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{960571B5-9178-4F29-B366-0585C526BAB0}\ProgID\ = "1b1ef0b9efe97081aee01e05745b9a1e_JaffaCakes118.TobjXQDBHO" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{960571B5-9178-4F29-B366-0585C526BAB0}\ = "TN²å¼þ" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{960571B5-9178-4F29-B366-0585C526BAB0}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{960571B5-9178-4F29-B366-0585C526BAB0}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1b1ef0b9efe97081aee01e05745b9a1e_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{960571B5-9178-4F29-B366-0585C526BAB0}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\1b1ef0b9efe97081aee01e05745b9a1e_JaffaCakes118.TobjXQDBHO regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\1b1ef0b9efe97081aee01e05745b9a1e_JaffaCakes118.TobjXQDBHO\ = "TN²å¼þ" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\1b1ef0b9efe97081aee01e05745b9a1e_JaffaCakes118.TobjXQDBHO\Clsid\ = "{960571B5-9178-4F29-B366-0585C526BAB0}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{960571B5-9178-4F29-B366-0585C526BAB0}\ProgID regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3184 wrote to memory of 4684 3184 regsvr32.exe 81 PID 3184 wrote to memory of 4684 3184 regsvr32.exe 81 PID 3184 wrote to memory of 4684 3184 regsvr32.exe 81
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1b1ef0b9efe97081aee01e05745b9a1e_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\1b1ef0b9efe97081aee01e05745b9a1e_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
PID:4684
-