Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
31e4418550f38fded69ab4f1f9990a2c_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
31e4418550f38fded69ab4f1f9990a2c_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
31e4418550f38fded69ab4f1f9990a2c_JaffaCakes118.dll
-
Size
249KB
-
MD5
31e4418550f38fded69ab4f1f9990a2c
-
SHA1
52544e58d0af1cb2ec7aefc752dcb32f4b5a7536
-
SHA256
73e5d581b717660ee40c106e3d6fcf543333ca2c57704f27951aeb62c26590fd
-
SHA512
4aad0e881f23071058b800585bb07137eed422c7d5fe2c4453c6d0c1463e844df101f30b7fe2e567037ed5c60716bbbdc0640d2179b5d80377af63596595eb40
-
SSDEEP
3072:OGRyXAz9xlxGzovR1ObfKDoCg6t851tAr3/AMqvGgv7tfkv7lZcrp/R9iMBDj:fKAz9xlxCCFQDeTkvJkvR6rdhDj
Malware Config
Signatures
-
Modifies registry class 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F18E535-DCF5-3663-4671-DDA5AB9E34E7}\ProgID\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F18E535-DCF5-3663-4671-DDA5AB9E34E7}\VersionIndependentProgID\ regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\WOW6432Node\CLSID\ = "{0F18E535-DCF5-3663-4671-DDA5AB9E34E7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F18E535-DCF5-3663-4671-DDA5AB9E34E7} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F18E535-DCF5-3663-4671-DDA5AB9E34E7}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F18E535-DCF5-3663-4671-DDA5AB9E34E7}\InprocServer32\ThreadingModel = "both" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\ regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\WOW6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F18E535-DCF5-3663-4671-DDA5AB9E34E7}\ProgID regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F18E535-DCF5-3663-4671-DDA5AB9E34E7}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F18E535-DCF5-3663-4671-DDA5AB9E34E7}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F18E535-DCF5-3663-4671-DDA5AB9E34E7}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\31e4418550f38fded69ab4f1f9990a2c_JaffaCakes118.dll" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1576 wrote to memory of 4860 1576 regsvr32.exe 81 PID 1576 wrote to memory of 4860 1576 regsvr32.exe 81 PID 1576 wrote to memory of 4860 1576 regsvr32.exe 81
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\31e4418550f38fded69ab4f1f9990a2c_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\31e4418550f38fded69ab4f1f9990a2c_JaffaCakes118.dll2⤵
- Modifies registry class
PID:4860
-