Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 11:55
Static task
static1
Behavioral task
behavioral1
Sample
3902fb6501b383e7fcc63451f367fd82_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3902fb6501b383e7fcc63451f367fd82_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3902fb6501b383e7fcc63451f367fd82_JaffaCakes118.exe
-
Size
47KB
-
MD5
3902fb6501b383e7fcc63451f367fd82
-
SHA1
1e9b6f1b9576088752145acff8f739ad0298bcf4
-
SHA256
7f7a9c096197c86ed030441ae2170856a86b7987cbdc03e6dd6995eb477d4637
-
SHA512
5f5340e59b444af7f69e9b678ede4f0d28c42b896e7d0dc7ff0f8a94c09c9fb533e08f376e7f77447f1e06cdd5ee10f1f73f115971fdbcbe7bf4adea6993ea32
-
SSDEEP
768:oTMegW662heGq+Uh6oiswwlMPBoYyNG95zKQKuvH24BVRuSwX7cwJ44rOg0:oTTJ32AV+Uh6Of06Fw/xvTbuSbwa4
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1680 rundll32.exe 3708 rundll32.exe -
Modifies WinLogon 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0040AA8\Startup = "B" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0040AA8\Logon = "B" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0040AA8\Asynchronous = "1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0040AA8\DllName = "C:\\Windows\\system32\\__c0040AA8.dat" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0040AA8\Logon = "B" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0040AA8 rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0040AA8\Asynchronous = "1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0040AA8\DllName = "C:\\Windows\\system32\\__c0040AA8.dat" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0040AA8\Impersonate = "0" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0040AA8 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0040AA8\Startup = "B" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\__c0040AA8.dat rundll32.exe File opened for modification C:\Windows\SysWOW64\__c0040AA8.dat rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1972 1680 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1680 rundll32.exe 1680 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 908 wrote to memory of 1680 908 3902fb6501b383e7fcc63451f367fd82_JaffaCakes118.exe 84 PID 908 wrote to memory of 1680 908 3902fb6501b383e7fcc63451f367fd82_JaffaCakes118.exe 84 PID 908 wrote to memory of 1680 908 3902fb6501b383e7fcc63451f367fd82_JaffaCakes118.exe 84 PID 1680 wrote to memory of 3708 1680 rundll32.exe 86 PID 1680 wrote to memory of 3708 1680 rundll32.exe 86 PID 1680 wrote to memory of 3708 1680 rundll32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3902fb6501b383e7fcc63451f367fd82_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3902fb6501b383e7fcc63451f367fd82_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\3902fb6501b383e7fcc63451f367fd82_JaffaCakes118.exe.dat",E2⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\system32\__c0040AA8.dat",B3⤵
- Loads dropped DLL
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 6603⤵
- Program crash
PID:1972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1680 -ip 16801⤵PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5d6cab399910aaf612025a5ed1c1dc78e
SHA18b4797283e3c430caab29107c45320f61d041f3f
SHA256c2038e6e0f53f785f755f8dcc855253af383ccd557c59e7b19b71ea4ec074164
SHA512573720e0ddef76db718187b44d5a2404166074eeeeb9caa09fa5a2a933f96b3ec37e8c82c480c8586b5646373d0acb501ed05c17117158af4917c10733a33e18