Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 08:17
Static task
static1
Behavioral task
behavioral1
Sample
27de7de49be558cf7fa7b42aa6da7941_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
27de7de49be558cf7fa7b42aa6da7941_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
27de7de49be558cf7fa7b42aa6da7941_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
27de7de49be558cf7fa7b42aa6da7941
-
SHA1
068522ed29f251d92cbdd2b6d8501d2bf1753b74
-
SHA256
4725f6712f4d716cb69e8a881406b02512d13640444da40a00bcd47575b5eb9d
-
SHA512
cd4e404cc28f94ae16f3666a2ace608738b09ae0131d484f2a9406ffab664a87b91792b30475516ffde24ce113042beccbe8e59e655fce06627f6e305eb44255
-
SSDEEP
24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs00Y:SuNZ7Ib8ZBL2/Xb
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\dticem\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\27de7de49be558cf7fa7b42aa6da7941_JaffaCakes118.dll" regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\b299c237aa.dll svchost.exe File opened for modification C:\Windows\SysWOW64\b299c237aa.dll svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2344 2180 regsvr32.exe 31 PID 2180 wrote to memory of 2344 2180 regsvr32.exe 31 PID 2180 wrote to memory of 2344 2180 regsvr32.exe 31 PID 2180 wrote to memory of 2344 2180 regsvr32.exe 31 PID 2180 wrote to memory of 2344 2180 regsvr32.exe 31 PID 2180 wrote to memory of 2344 2180 regsvr32.exe 31 PID 2180 wrote to memory of 2344 2180 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\27de7de49be558cf7fa7b42aa6da7941_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\27de7de49be558cf7fa7b42aa6da7941_JaffaCakes118.dll2⤵
- Server Software Component: Terminal Services DLL
PID:2344
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k dtcGep1⤵
- Drops file in System32 directory
PID:2348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114B
MD56162c644c20f2a04746896f09d21108f
SHA1bc545bee2a3bec955d8f51e0d470e3a392750161
SHA2563d88963d071dfd333c00147fde6ae9f4cfe43bdb48465fcde9940a3b89fc4ea0
SHA5123403b6aaca7414fa217d7d2d333bd2ed3ad56c7e1ea0ce87c7bedca50076b0ae5223198211c7bfb56b83e118ac259bf67fea09f40e88aecb4996d1841098ce97