Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2024, 08:57

General

  • Target

    387a4f2ae6425aad90d8edf2266e9d3d_JaffaCakes118.dll

  • Size

    1.1MB

  • MD5

    387a4f2ae6425aad90d8edf2266e9d3d

  • SHA1

    ed97413fc292a8f16567f4d9b1b296063cc9ce30

  • SHA256

    d1460a23df05dfb9ae0234fae0e01dfd8a7c39575f9bc8c539260a853345c393

  • SHA512

    705c8f068d9ba5cb185d749ea44e1eb0dddf773f92a5eec1fea6f1b2c4b14d9690d80fc28c8f90ef41373e8d534c9a030a25557f71919b5225b1d07dd88923e1

  • SSDEEP

    24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs00a:SuNZ7Ib8ZBL2/XF

Score
8/10

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\387a4f2ae6425aad90d8edf2266e9d3d_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\387a4f2ae6425aad90d8edf2266e9d3d_JaffaCakes118.dll
      2⤵
      • Server Software Component: Terminal Services DLL
      PID:624
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k dtcGep -s dticem
    1⤵
    • Drops file in System32 directory
    PID:3784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\226080bd88.dll

    Filesize

    114B

    MD5

    0017dd8d4b95be734977e8b4cb7a2d42

    SHA1

    ba67ff2fc46f36a9def980d6d316352774a4124b

    SHA256

    3f3ce38ea4093a0c621e1543f09c1e4c73610d9c112f7fe07e94266a1333df29

    SHA512

    243bf9545ff0446681fc57e25b43bd6a71686b7e36a80b03d01f5ce62810956e487483dad492bf51388479ee8407e87eb2ddf3ef1b5ed97595f90f8a8ba5a3ba

  • memory/3784-0-0x0000000001900000-0x0000000001A17000-memory.dmp

    Filesize

    1.1MB

  • memory/3784-8-0x0000000001900000-0x0000000001A17000-memory.dmp

    Filesize

    1.1MB

  • memory/3784-32-0x0000000001900000-0x0000000001A17000-memory.dmp

    Filesize

    1.1MB