Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
227dc054d39fe504cc476cecb993b394_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
227dc054d39fe504cc476cecb993b394_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
227dc054d39fe504cc476cecb993b394_JaffaCakes118.dll
-
Size
315KB
-
MD5
227dc054d39fe504cc476cecb993b394
-
SHA1
ada2cd89e3a518eafd93452dddcaf6f08b84fde4
-
SHA256
b78879f396fc790eb1f7ee107499ead23f5decc311aa923e3cf1515fe684b4ac
-
SHA512
6d2d33cb5cdf842e2548ad3a6621a0695680eda6c41642f104cb4a8af65caa58fca06d5a79908bb462a68c6c1142add3c8b0821ffb96b6b928de1a8538dff2d2
-
SSDEEP
6144:gelBFFfTG9SIkOc0KurgsScWzYeyno5u+sZh+gNwaiRQiEeBvU8w:jlNC9ggMsAhynosZhLNL+QipBB
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2576 wscsvc32.exe -
Loads dropped DLL 2 IoCs
pid Process 2548 rundll32.exe 2548 rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main wscsvc32.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2548 rundll32.exe 2548 rundll32.exe 2548 rundll32.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2548 rundll32.exe 2548 rundll32.exe 2548 rundll32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2576 wscsvc32.exe 2576 wscsvc32.exe 2576 wscsvc32.exe 2576 wscsvc32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2548 1704 rundll32.exe 28 PID 1704 wrote to memory of 2548 1704 rundll32.exe 28 PID 1704 wrote to memory of 2548 1704 rundll32.exe 28 PID 1704 wrote to memory of 2548 1704 rundll32.exe 28 PID 1704 wrote to memory of 2548 1704 rundll32.exe 28 PID 1704 wrote to memory of 2548 1704 rundll32.exe 28 PID 1704 wrote to memory of 2548 1704 rundll32.exe 28 PID 2548 wrote to memory of 2576 2548 rundll32.exe 29 PID 2548 wrote to memory of 2576 2548 rundll32.exe 29 PID 2548 wrote to memory of 2576 2548 rundll32.exe 29 PID 2548 wrote to memory of 2576 2548 rundll32.exe 29 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" wscsvc32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\227dc054d39fe504cc476cecb993b394_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\227dc054d39fe504cc476cecb993b394_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\wscsvc32.exeC:\Users\Admin\AppData\Local\Temp\wscsvc32.exe3⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2576
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5dd92bc3cf743f6d9ff1bf6804462ff4b
SHA170284b6ac2d77f5023ab5b7026a0214260e85ccd
SHA256373f41b40f53bdd391a6f2918284a0fffc99d712e7934a7bd3e189d00af316d9
SHA512da39cff7189db608b48dfad092b33053b6692016278190f2693122d43e6782c3abe598566dbd67e2c9787f2478f1bd5a21d2c9398acca0b939bf2936a546c777