Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 02:53

General

  • Target

    330960c1f80b677909224705496a4f45_JaffaCakes118.exe

  • Size

    398KB

  • MD5

    330960c1f80b677909224705496a4f45

  • SHA1

    49f430d851cf8d498544743458eb77c5475a4f0d

  • SHA256

    31768bf721a2b5ec5292b793a610b8461e954326d3a9671d8118aad83e1e233c

  • SHA512

    8e00f93c367a453ba4a35fe23ad9497311c91887bebcc7863ec34d39223591a6e613d1e857323207ae9afd7459fc102b09076bafa5ca40f14c9758b229547d54

  • SSDEEP

    6144:ossLUguFTPiPbQvwd64Mi3mZSwweCU+gKOCx6EhaZEtYLLbewAekW3C:o1LRuFu2UMSmZker+gKJx0ZKY6w

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 17 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\330960c1f80b677909224705496a4f45_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\330960c1f80b677909224705496a4f45_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Windows\SysWOW64\rundll2000.exe
      "C:\Windows\system32\rundll2000.exe" "C:\Windows\system32\wbem\fgcxt.dll",Export @install
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4392
    • C:\Windows\SysWOW64\rundll2000.exe
      "C:\Windows\system32\rundll2000.exe" "C:\Windows\system32\wbem\fgcxt.dll",Export @start
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4796
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\ddboy.dll",ExportFunc 1001
      2⤵
      • Server Software Component: Terminal Services DLL
      • Loads dropped DLL
      PID:3156
    • C:\Windows\f2.exe
      "C:\Windows\f2.exe"
      2⤵
      • Executes dropped EXE
      PID:960
    • C:\Windows\g3.exe
      "C:\Windows\g3.exe"
      2⤵
      • Drops file in Drivers directory
      • Sets service image path in registry
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      PID:1720
    • C:\Windows\update.exe
      "C:\Windows\update.exe"
      2⤵
      • Executes dropped EXE
      PID:2176
  • C:\WINDOWS\SysWOW64\RUNDLL2000.EXE
    C:\WINDOWS\SysWOW64\RUNDLL2000.EXE C:\WINDOWS\SYSTEM32\WBEM\FGCXT.DLL,Export 1087
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:3216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\SysWOW64\WBEM\ocmor.dll

    Filesize

    6KB

    MD5

    2c9c3948edbbdb7015054eda23d1cca0

    SHA1

    14a6aa1d75dfdfc2fd213545f150c034b0f7286f

    SHA256

    b75790e97df65e074970d9347148d60860328b91c6e0be08deacdc204b076fea

    SHA512

    75c70cb432107b43e20f6df8dc9484deb60d0a4dd2bf7182686a56bc533aaf44862015f40a62d867224502a5a505611b4d90b5638cf86721fcca378098fa9e9b

  • C:\Windows\SysWOW64\ddboy.dll

    Filesize

    238KB

    MD5

    9c3970c3267ae3d661d2738d15783453

    SHA1

    d462ec4294b462982a676cd4711f3b3199ef315b

    SHA256

    a8dc38b506e0a5fe7f8a324659edbd65c586111732fe379333a617162dd60a8d

    SHA512

    d7b72bf08c91302ed0ba44068f9f6cada495b4e7a38b802162c65174ecfde38d9144e81fd133ce70520e5db06b845bc9283f7eb98f66901cdb5f341c52cadd82

  • C:\Windows\SysWOW64\rundll2000.exe

    Filesize

    10KB

    MD5

    4936a6954ed59700a3c706f9094685ee

    SHA1

    124edd171bfc8a5c7f5fcf2147f6ff43b705bb79

    SHA256

    e598bcf79618ab6ab58b29b7a7f3e5fc01ce6c7dbefcaa308565d3d9168249fe

    SHA512

    1ef09ed6a9b22d761981e759fa2089e9c461fda4a46cba66431817bc7b75451d4639e63cd3872a71c3bf123831983590075fc924424833adf0ef491056de32ea

  • C:\Windows\SysWOW64\wbem\fgcxt.dll

    Filesize

    240KB

    MD5

    abbe23918f44967e57e44c5cc2ea1baa

    SHA1

    b83c3427b8d5061177e54153586d6b9730947e85

    SHA256

    59eb96cd179faebd6a7ae576d66b701f41e7f726db94e20f8bf76603be4ec28a

    SHA512

    b174d0fb6c097d7b25b128ede5c7c49af92cb30441db6aa3ea1c04d0a718ca2d130c8dfba5068a2ba58092e7915fe819761be4536c332e8afde80333a83fde27

  • C:\Windows\f2.exe

    Filesize

    64KB

    MD5

    1d07f65b736701e027d1822b2b37f8e2

    SHA1

    1bd7fc6fbbac67f4747c468db585669f947aaf20

    SHA256

    1e52fc324af675c4cdf42af8e01ea50b6afb5c064ec5f61386a617c2a1d2b91f

    SHA512

    501410b8fae55a54900104ce3b1e8a3a2d3668e31043708259f1617ed00d3bc58c0841097429ff8ed6caf5f5448dfd8b650ceb726df9fff7dc014dda72064cb0

  • C:\Windows\g3.exe

    Filesize

    76KB

    MD5

    08f3b0ba718aaf3ea2bec4b70472a7f1

    SHA1

    27202d46630a1b006f8f14de64beb7a8efc9ae6e

    SHA256

    313c8feed49b6a7600986fda3e9641e8ef85d027b25648a1b15be9d74cb55a43

    SHA512

    2772b9d7aa945daabc8e1681562789fe3ac7c388c0bc34f649be8e4f368fc54aa7e506bd50db9dd28acf3ebf352ac7d82c3fd4439c8ac29a11f9f73e0d622ac9

  • C:\Windows\update.exe

    Filesize

    144KB

    MD5

    5a954ea67eff2254ed20d2592be7ae22

    SHA1

    59d07e9e928d319b910774f60448693e4e89530b

    SHA256

    b8d15f19291773c61262666424b18eb5dfbdb0b795b2dd09539da88b48a05b43

    SHA512

    f91e1ec4b97fc37222134db92477ee986ff5226e2ee06dbc7436c4c201f440118b95c5781ebb73e1e86ac991945e0c7ba7f99abeb15048ddd205b29f441e6c2a

  • memory/1600-26-0x0000000000400000-0x0000000000463A40-memory.dmp

    Filesize

    398KB

  • memory/1600-56-0x0000000000400000-0x0000000000463A40-memory.dmp

    Filesize

    398KB

  • memory/4392-9-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/4392-12-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/4796-21-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB