Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
11s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 23:11
Behavioral task
behavioral1
Sample
298bcd92ae4cad3f7d91b8e44893814a_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
298bcd92ae4cad3f7d91b8e44893814a_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Errors
General
-
Target
298bcd92ae4cad3f7d91b8e44893814a_JaffaCakes118.dll
-
Size
70KB
-
MD5
298bcd92ae4cad3f7d91b8e44893814a
-
SHA1
a28b0b8c131b02dc1552ec11943dc78e4bd2e641
-
SHA256
4d0c47e3d5d9c36e1b9a94416b83abb3e7f16441c54bf33584b235859e7a4c82
-
SHA512
72a998ad8541ad35f1e890cafd7fdeb5046503f442f7296f14e6ef44c9bb0911bed72658556d0c132855c34cdf032631e2c5439688c1ebb963c3bcb0cfe17054
-
SSDEEP
1536:47tqjOr4o+KMJSfbsDH62q6HI15pKZ+ki7yitur8Nmck1JC:47tR+KwyUTqHK4FHorKm/E
Malware Config
Signatures
-
Modifies Shared Task Scheduler registry keys 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{3578CC4F-0E1F-445E-8072-E78435C71001} = "dxetsxvvgwwy" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{3578CC4F-0E1F-445E-8072-E78435C71001} = "298bcd92ae4c" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{3578CC4F-0E1F-445E-8072-E78435C71001} = "298bcd92ae4cad3f7d91b8e44893814a_JaffaCakes118" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler regsvr32.exe -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000023252-3.dat acprotect behavioral2/files/0x000800000002347f-8.dat acprotect -
Loads dropped DLL 3 IoCs
pid Process 1200 regsvr32.exe 5068 regsvr32.exe 5068 regsvr32.exe -
resource yara_rule behavioral2/memory/2424-0-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral2/files/0x0007000000023252-3.dat upx behavioral2/memory/1200-7-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral2/files/0x000800000002347f-8.dat upx behavioral2/memory/5068-11-0x00000000004E0000-0x0000000000512000-memory.dmp upx behavioral2/memory/2424-15-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral2/memory/1200-13-0x0000000000400000-0x0000000000432000-memory.dmp upx -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dxetsxvvgwwy.dll regsvr32.exe File created C:\Windows\SysWOW64\dxetsxvvgwwy.dll regsvr32.exe File opened for modification C:\Windows\SysWOW64\298bcd92ae4c.dll regsvr32.exe File created C:\Windows\SysWOW64\298bcd92ae4c.dll regsvr32.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "143" LogonUI.exe -
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001}\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\298bcd92ae4cad3f7d91b8e44893814a_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001}\ = "C:\\Windows\\SysWow64\\dxetsxvvgwwy.dll" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001}\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001}\InprocServer32\ = "C:\\Windows\\SysWow64\\dxetsxvvgwwy.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001}\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001}\ = "C:\\Windows\\SysWow64\\298bcd92ae4c.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001}\InprocServer32\ = "C:\\Windows\\SysWow64\\298bcd92ae4c.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001}\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\298bcd92ae4cad3f7d91b8e44893814a_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 5068 regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3220 LogonUI.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2424 1456 regsvr32.exe 82 PID 1456 wrote to memory of 2424 1456 regsvr32.exe 82 PID 1456 wrote to memory of 2424 1456 regsvr32.exe 82 PID 2424 wrote to memory of 1200 2424 regsvr32.exe 84 PID 2424 wrote to memory of 1200 2424 regsvr32.exe 84 PID 2424 wrote to memory of 1200 2424 regsvr32.exe 84 PID 1200 wrote to memory of 5068 1200 regsvr32.exe 85 PID 1200 wrote to memory of 5068 1200 regsvr32.exe 85 PID 1200 wrote to memory of 5068 1200 regsvr32.exe 85
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\298bcd92ae4cad3f7d91b8e44893814a_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\298bcd92ae4cad3f7d91b8e44893814a_JaffaCakes118.dll2⤵
- Modifies Shared Task Scheduler registry keys
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe C:\Windows\system32\dxetsxvvgwwy.dll /s3⤵
- Modifies Shared Task Scheduler registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe C:\Windows\system32\298bcd92ae4c.dll /s4⤵
- Modifies Shared Task Scheduler registry keys
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3945055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5298bcd92ae4cad3f7d91b8e44893814a
SHA1a28b0b8c131b02dc1552ec11943dc78e4bd2e641
SHA2564d0c47e3d5d9c36e1b9a94416b83abb3e7f16441c54bf33584b235859e7a4c82
SHA51272a998ad8541ad35f1e890cafd7fdeb5046503f442f7296f14e6ef44c9bb0911bed72658556d0c132855c34cdf032631e2c5439688c1ebb963c3bcb0cfe17054
-
Filesize
70KB
MD5f7c1bfb087a46f9ab671cf62e392bef4
SHA1c881aed1f37e6eeadd7f1d453b281309d3ac0f9c
SHA2568350a647d3c0aee548be6b59958a24167dd9023781e5a1e36d8fbbadefecb662
SHA5128ef9b34a18519b16addb21910b24a78d890caeb03739eda29d25a884c62a00d06fb37d9a38f94d7a856abc2b56b983d866668601e18e11e81e3274956770c35d