Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
227dc054d39fe504cc476cecb993b394_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
227dc054d39fe504cc476cecb993b394_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
227dc054d39fe504cc476cecb993b394_JaffaCakes118.dll
-
Size
315KB
-
MD5
227dc054d39fe504cc476cecb993b394
-
SHA1
ada2cd89e3a518eafd93452dddcaf6f08b84fde4
-
SHA256
b78879f396fc790eb1f7ee107499ead23f5decc311aa923e3cf1515fe684b4ac
-
SHA512
6d2d33cb5cdf842e2548ad3a6621a0695680eda6c41642f104cb4a8af65caa58fca06d5a79908bb462a68c6c1142add3c8b0821ffb96b6b928de1a8538dff2d2
-
SSDEEP
6144:gelBFFfTG9SIkOc0KurgsScWzYeyno5u+sZh+gNwaiRQiEeBvU8w:jlNC9ggMsAhynosZhLNL+QipBB
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 4728 wscsvc32.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3952 rundll32.exe 3952 rundll32.exe 3952 rundll32.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3952 rundll32.exe 3952 rundll32.exe 3952 rundll32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4728 wscsvc32.exe 4728 wscsvc32.exe 4728 wscsvc32.exe 4728 wscsvc32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3624 wrote to memory of 3952 3624 rundll32.exe 82 PID 3624 wrote to memory of 3952 3624 rundll32.exe 82 PID 3624 wrote to memory of 3952 3624 rundll32.exe 82 PID 3952 wrote to memory of 4728 3952 rundll32.exe 86 PID 3952 wrote to memory of 4728 3952 rundll32.exe 86 PID 3952 wrote to memory of 4728 3952 rundll32.exe 86 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" wscsvc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\227dc054d39fe504cc476cecb993b394_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\227dc054d39fe504cc476cecb993b394_JaffaCakes118.dll,#12⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\wscsvc32.exeC:\Users\Admin\AppData\Local\Temp\wscsvc32.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5dd92bc3cf743f6d9ff1bf6804462ff4b
SHA170284b6ac2d77f5023ab5b7026a0214260e85ccd
SHA256373f41b40f53bdd391a6f2918284a0fffc99d712e7934a7bd3e189d00af316d9
SHA512da39cff7189db608b48dfad092b33053b6692016278190f2693122d43e6782c3abe598566dbd67e2c9787f2478f1bd5a21d2c9398acca0b939bf2936a546c777