Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 03:07

General

  • Target

    246bd05d8eb3f548d9938d01e2ce7b5c_JaffaCakes118.dll

  • Size

    1.1MB

  • MD5

    246bd05d8eb3f548d9938d01e2ce7b5c

  • SHA1

    e177fff3a6a3a4aab2c283433e2f83b2a5de54c1

  • SHA256

    28ac7c74229072fd3d4b5a11d113930fdf94935f04991a923c6fa98516e69b64

  • SHA512

    412b994c712c9b115931e32a46058d9f518f578562ae2e9cabb05383f06c12c5f8eb555a46eb4c8dc6c9894cd5fa8782b2c6db917df7d00a4512ca54d4f65486

  • SSDEEP

    24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs006:SuNZ7Ib8ZBL2/X5

Score
8/10

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\246bd05d8eb3f548d9938d01e2ce7b5c_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\246bd05d8eb3f548d9938d01e2ce7b5c_JaffaCakes118.dll
      2⤵
      • Server Software Component: Terminal Services DLL
      PID:4200
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k dtcGep -s dticem
    1⤵
    • Drops file in System32 directory
    PID:4480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\22a8cf2ed1.dll

    Filesize

    114B

    MD5

    6b59b5ddb89f19dc5e71bad0f4ed30d8

    SHA1

    8416bf98ae5fffe3d52f5a0369890cbb37f17901

    SHA256

    b5be70927f1dc9f3464512216ae021aca70487c66f702355a14a2e9c0ffdd302

    SHA512

    cb8e985478cc06cca4662894f29245ab75001c1e73165eba38a143dd36db217e049cf9c381c56f519c71027423ae3ae2a88ffd680ab36faa1d01d89943e20385

  • memory/4480-0-0x0000000001D00000-0x0000000001E17000-memory.dmp

    Filesize

    1.1MB

  • memory/4480-8-0x0000000001D00000-0x0000000001E17000-memory.dmp

    Filesize

    1.1MB

  • memory/4480-22-0x0000000001D00000-0x0000000001E17000-memory.dmp

    Filesize

    1.1MB