Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2024, 10:41

General

  • Target

    38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe

  • Size

    417KB

  • MD5

    38c7b3a1e607aed753b35b78a105b029

  • SHA1

    c3a2d3d83fb4e29c03e6cc5c34a53ae34cc792d1

  • SHA256

    af1bbb21e8744b9572c291304b98064e9842572d92bb67d4e4e3c9ffdf07781e

  • SHA512

    78df751971b3b28c7180ee80024c727adbfd50a500043a95dc1723d7e4866f19722207af9d9bd663c2a4d3424dcb0799082fb3284c1e813ee0fd1e4ec86ce8d4

  • SSDEEP

    12288:Dr1WiLwWEaCmqp43s39OHCkM4ch8eLZDPK6w:9WOt2mL3s3gbMoi1w

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 33 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 18 IoCs
  • Drops file in Windows directory 13 IoCs
  • Modifies registry class 47 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4bl4.dll"
      2⤵
        PID:900
      • C:\Windows\SysWOW64\regsvr32.exe
        C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\c6cb.dll"
        2⤵
          PID:4764
        • C:\Windows\SysWOW64\regsvr32.exe
          C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\353r.dll"
          2⤵
            PID:2292
          • C:\Windows\SysWOW64\regsvr32.exe
            C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4b3o.dll"
            2⤵
              PID:4504
            • C:\Windows\SysWOW64\regsvr32.exe
              C:\Windows\system32\regsvr32.exe /s "C:\Windows\system32\4b3o.dll"
              2⤵
              • Loads dropped DLL
              • Installs/modifies Browser Helper Object
              • Modifies registry class
              PID:5012
            • C:\Windows\SysWOW64\b55d.exe
              C:\Windows\system32\b55d.exe -i
              2⤵
              • Executes dropped EXE
              PID:2848
            • C:\Windows\SysWOW64\b55d.exe
              C:\Windows\system32\b55d.exe -s
              2⤵
              • Executes dropped EXE
              PID:4716
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32 C:\Windows\system32\46be.dll, Always
              2⤵
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              • Drops file in System32 directory
              PID:1196
          • C:\Windows\SysWOW64\b55d.exe
            C:\Windows\SysWOW64\b55d.exe
            1⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Writes to the Master Boot Record (MBR)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2664
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32 C:\Windows\system32\46be.dll,Always
              2⤵
              • Loads dropped DLL
              PID:3748

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\4.dll

            Filesize

            123KB

            MD5

            a8c17915515ea7d26852814cd4f18946

            SHA1

            14cde710334cf2b3b13e7128a7b7dd9b7c39eca7

            SHA256

            38a38dccf6784159a3decb554180e9f898859d5968a5f01bf9b5810e54d10be6

            SHA512

            0ae5cf9b63ff22c8f86558ec89727d8b0a52364d966970006b1688743f0800b873e67177a5d02a22ec583f9a2b4e47c90563005e40b753039a1b9d1cbe8a0793

          • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\b.dll

            Filesize

            57KB

            MD5

            1c0cc378fdfc5ec08ccf619b3ccfa0ee

            SHA1

            40b85151bc6defa5a0e9a9279098bde3045b3a17

            SHA256

            d8476b8ef4af854ae3fc32d464df734cc7fa72fa38b19f5c91ca0a8bc93ed11f

            SHA512

            b3ca68fe54ac2a9592398c8d7860f1fd627fb959abdcdfe77b23050e87fcee5f223b26793106526ded35bdb1a21589448ec52a056207994dc227429ab133d7dd

          • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\p.dll

            Filesize

            255KB

            MD5

            cdc6c3b22ecabb875549dc6d7489e09d

            SHA1

            8dfc2087a7e045bc1de4be92d6ba15b04bcec952

            SHA256

            6bd70c5711b39316d7d92f1704d21a26e314a3c063e0df13921f73a2334b9f3c

            SHA512

            9c164abd44b636ad267d1f5b1a49c07631e8b0c734c90dbe753b15b43db01021980d4a046914f8a3a0339eaeb33b9d4271095f20174d7d0d6a3b5bc09eaaa873

          • memory/808-0-0x0000000000400000-0x0000000000472000-memory.dmp

            Filesize

            456KB

          • memory/808-1-0x00000000021D0000-0x00000000021D2000-memory.dmp

            Filesize

            8KB

          • memory/808-74-0x0000000000400000-0x0000000000472000-memory.dmp

            Filesize

            456KB

          • memory/1196-85-0x0000000010000000-0x00000000100B3000-memory.dmp

            Filesize

            716KB

          • memory/1196-96-0x0000000010000000-0x00000000100B3000-memory.dmp

            Filesize

            716KB

          • memory/1196-76-0x0000000010000000-0x00000000100B3000-memory.dmp

            Filesize

            716KB

          • memory/1196-91-0x0000000010000000-0x00000000100B3000-memory.dmp

            Filesize

            716KB

          • memory/2664-110-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-119-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2664-83-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2664-86-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-164-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-88-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-89-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2664-92-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-160-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2664-94-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-95-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2664-159-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-98-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-100-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-101-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2664-104-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-106-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-107-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2664-71-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-112-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-113-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2664-116-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-118-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-82-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-122-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-124-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-125-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2664-128-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-130-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-131-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2664-134-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-136-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-137-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2664-140-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-142-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-143-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2664-146-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-148-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-149-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2664-152-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-154-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB

          • memory/2664-155-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2848-59-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2848-61-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/3748-78-0x0000000010000000-0x00000000100B3000-memory.dmp

            Filesize

            716KB

          • memory/4716-65-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/5012-49-0x0000000010000000-0x0000000010024000-memory.dmp

            Filesize

            144KB