Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
246bd05d8eb3f548d9938d01e2ce7b5c_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
246bd05d8eb3f548d9938d01e2ce7b5c_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
246bd05d8eb3f548d9938d01e2ce7b5c_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
246bd05d8eb3f548d9938d01e2ce7b5c
-
SHA1
e177fff3a6a3a4aab2c283433e2f83b2a5de54c1
-
SHA256
28ac7c74229072fd3d4b5a11d113930fdf94935f04991a923c6fa98516e69b64
-
SHA512
412b994c712c9b115931e32a46058d9f518f578562ae2e9cabb05383f06c12c5f8eb555a46eb4c8dc6c9894cd5fa8782b2c6db917df7d00a4512ca54d4f65486
-
SSDEEP
24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs006:SuNZ7Ib8ZBL2/X5
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\dticem\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\246bd05d8eb3f548d9938d01e2ce7b5c_JaffaCakes118.dll" regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\fa2a414c6b.dll svchost.exe File created C:\Windows\SysWOW64\fa2a414c6b.dll svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2404 1632 regsvr32.exe 28 PID 1632 wrote to memory of 2404 1632 regsvr32.exe 28 PID 1632 wrote to memory of 2404 1632 regsvr32.exe 28 PID 1632 wrote to memory of 2404 1632 regsvr32.exe 28 PID 1632 wrote to memory of 2404 1632 regsvr32.exe 28 PID 1632 wrote to memory of 2404 1632 regsvr32.exe 28 PID 1632 wrote to memory of 2404 1632 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\246bd05d8eb3f548d9938d01e2ce7b5c_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\246bd05d8eb3f548d9938d01e2ce7b5c_JaffaCakes118.dll2⤵
- Server Software Component: Terminal Services DLL
PID:2404
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k dtcGep1⤵
- Drops file in System32 directory
PID:1184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114B
MD5a18d7c05a5ebc0fb5a203b2302882da7
SHA1e17657d1e8e667fafb75bb278c7be426a80365df
SHA256f714aa4c944b1efc7ee264e1b08487cf54931557e88f2bfcb6c26b9ab5f54d82
SHA51209574eb04cf8a9566da1412113d1e93ebc86ed8c2a00b8d1f330bca6c2b9de42061efb566f87732843a1a5cb4907fd7e496fcc004df33d54c29533960d848ea1