Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 10:41

General

  • Target

    38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe

  • Size

    417KB

  • MD5

    38c7b3a1e607aed753b35b78a105b029

  • SHA1

    c3a2d3d83fb4e29c03e6cc5c34a53ae34cc792d1

  • SHA256

    af1bbb21e8744b9572c291304b98064e9842572d92bb67d4e4e3c9ffdf07781e

  • SHA512

    78df751971b3b28c7180ee80024c727adbfd50a500043a95dc1723d7e4866f19722207af9d9bd663c2a4d3424dcb0799082fb3284c1e813ee0fd1e4ec86ce8d4

  • SSDEEP

    12288:Dr1WiLwWEaCmqp43s39OHCkM4ch8eLZDPK6w:9WOt2mL3s3gbMoi1w

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 49 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 19 IoCs
  • Drops file in Windows directory 13 IoCs
  • Modifies registry class 47 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4bl4.dll"
      2⤵
        PID:2124
      • C:\Windows\SysWOW64\regsvr32.exe
        C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\c6cb.dll"
        2⤵
          PID:2764
        • C:\Windows\SysWOW64\regsvr32.exe
          C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\353r.dll"
          2⤵
            PID:2808
          • C:\Windows\SysWOW64\regsvr32.exe
            C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4b3o.dll"
            2⤵
              PID:2812
            • C:\Windows\SysWOW64\regsvr32.exe
              C:\Windows\system32\regsvr32.exe /s "C:\Windows\system32\4b3o.dll"
              2⤵
              • Loads dropped DLL
              • Installs/modifies Browser Helper Object
              • Modifies registry class
              PID:2984
            • C:\Windows\SysWOW64\b55d.exe
              C:\Windows\system32\b55d.exe -i
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2852
            • C:\Windows\SysWOW64\b55d.exe
              C:\Windows\system32\b55d.exe -s
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2636
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32 C:\Windows\system32\46be.dll, Always
              2⤵
              • Loads dropped DLL
              PID:1048
          • C:\Windows\SysWOW64\b55d.exe
            C:\Windows\SysWOW64\b55d.exe
            1⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Writes to the Master Boot Record (MBR)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2392
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32 C:\Windows\system32\46be.dll,Always
              2⤵
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              • Drops file in System32 directory
              PID:1484

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\4.dll

            Filesize

            83KB

            MD5

            40b5629e4fcc3dba8e0363f132f8cd47

            SHA1

            6495d3ab0ffd901a876362258c1ae30a043ec05e

            SHA256

            0910b095d7ad49fcd161411e0f15ad89129ed75177be8c097d51a477c3c6e12a

            SHA512

            38cbf73f88e7153a0cd2f9e54331548d65b90404f1a43672e9099d982e07ec6e9c2280ca4b49257f903d496587f12a9c020a7987b645a427f0a9082a13907df6

          • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\b.dll

            Filesize

            93KB

            MD5

            46d6032ea50d9a571332da56c0af5348

            SHA1

            25dbf270aa07b9ff7d5b1cec72c813b401ecbc1f

            SHA256

            9c280248baa9512fbf4bc44e8aa1b7dc69306349fa93e552ecdc4964ef1a1691

            SHA512

            3994c9380673704c2dd30639582a3edbc05e0fa302e5493251d0503c2d13d2490f9b0d3c9c94702a26274744033ff8647026d669e13d48d20ae6360281887e5e

          • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\p.dll

            Filesize

            215KB

            MD5

            94a1bda50441ef499e681b84ab7f6078

            SHA1

            4db1d26d8de273e5b2b635429c9b8ddbecc796a3

            SHA256

            51f588eec6e24f6c22b6e3d2f6c9f465ff72772bede9e312efc9055ad5daabf9

            SHA512

            891c200cfe604a35e2adc96230595a3248994f825ac008af8f40a4e1ca09a9f8e422936f3d3004f58ec1ed2a76e22463b015e29557e6002d793532cc6021f4ae

          • memory/1048-108-0x0000000010000000-0x00000000100B3000-memory.dmp

            Filesize

            716KB

          • memory/1484-127-0x0000000010000000-0x00000000100B3000-memory.dmp

            Filesize

            716KB

          • memory/1484-121-0x0000000010000000-0x00000000100B3000-memory.dmp

            Filesize

            716KB

          • memory/1484-115-0x0000000010000000-0x00000000100B3000-memory.dmp

            Filesize

            716KB

          • memory/1484-107-0x0000000010000000-0x00000000100B3000-memory.dmp

            Filesize

            716KB

          • memory/2384-96-0x0000000000400000-0x0000000000472000-memory.dmp

            Filesize

            456KB

          • memory/2384-1-0x0000000000240000-0x00000000002B2000-memory.dmp

            Filesize

            456KB

          • memory/2384-0-0x0000000000400000-0x0000000000472000-memory.dmp

            Filesize

            456KB

          • memory/2384-2-0x0000000000260000-0x0000000000262000-memory.dmp

            Filesize

            8KB

          • memory/2384-61-0x0000000000390000-0x00000000003AD000-memory.dmp

            Filesize

            116KB

          • memory/2384-67-0x0000000000390000-0x00000000003AD000-memory.dmp

            Filesize

            116KB

          • memory/2392-137-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2392-130-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2392-181-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2392-179-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2392-177-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2392-97-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2392-176-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2392-174-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2392-173-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2392-112-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2392-113-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2392-116-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2392-170-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2392-118-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2392-119-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2392-122-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2392-166-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2392-124-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2392-125-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2392-128-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2392-162-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2392-158-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2392-131-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2392-134-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2392-136-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2392-154-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2392-141-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2392-144-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2392-146-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2392-150-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2636-86-0x0000000000230000-0x000000000024D000-memory.dmp

            Filesize

            116KB

          • memory/2636-80-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2636-89-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2636-84-0x0000000000230000-0x000000000024D000-memory.dmp

            Filesize

            116KB

          • memory/2636-85-0x0000000000230000-0x000000000024D000-memory.dmp

            Filesize

            116KB

          • memory/2852-68-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2852-73-0x00000000001C0000-0x00000000001DD000-memory.dmp

            Filesize

            116KB

          • memory/2852-75-0x00000000001C0000-0x00000000001DD000-memory.dmp

            Filesize

            116KB

          • memory/2852-74-0x00000000001C0000-0x00000000001DD000-memory.dmp

            Filesize

            116KB

          • memory/2852-76-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2984-52-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB