Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 18:56 UTC
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3e7e1e4be3743aa1dcdfb4855361eaaa_JaffaCakes118.dll
Resource
win7-20240704-en
4 signatures
150 seconds
General
-
Target
3e7e1e4be3743aa1dcdfb4855361eaaa_JaffaCakes118.dll
-
Size
553KB
-
MD5
3e7e1e4be3743aa1dcdfb4855361eaaa
-
SHA1
17f350f8a6eee8dc99dd84d6d380f7ca6c1a641b
-
SHA256
439202af5e70b2ca14cab29bfb8e90ce4be31c829b79728e1dbf344e01c96d04
-
SHA512
05a9639e26058010daa61c77b77a20b9bbdf1d2dae477aab66aa7e3ccf4e66d059c6045ad34906efaeb878b19e79ea64b803e860ffd8f015a7f244f1ba62e695
-
SSDEEP
12288:Uwcu7OXseaDMe0Pxdt27mK/zYsLR3T8Nk0evAp0URIC6sMlmSd:UwR+seaDMe0PxdQLR3juP2Zs0b
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02A84255-2F4A-367E-11C4-D5AEB4B43AB3} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02A84255-2F4A-367E-11C4-D5AEB4B43AB3}\NoExplorer = "1" regsvr32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{32AF64F7-4F4E-1EAD-2364-84D07503693A} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars regsvr32.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32AF64F7-4F4E-1EAD-2364-84D07503693A}\ = "Search panel" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32AF64F7-4F4E-1EAD-2364-84D07503693A}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32AF64F7-4F4E-1EAD-2364-84D07503693A}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32AF64F7-4F4E-1EAD-2364-84D07503693A}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{02A84255-2F4A-367E-11C4-D5AEB4B43AB3}\ = "searchersmart search enhancer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{02A84255-2F4A-367E-11C4-D5AEB4B43AB3}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3e7e1e4be3743aa1dcdfb4855361eaaa_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32AF64F7-4F4E-1EAD-2364-84D07503693A}\Implemented Categories\{00021493-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32AF64F7-4F4E-1EAD-2364-84D07503693A}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{02A84255-2F4A-367E-11C4-D5AEB4B43AB3}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{02A84255-2F4A-367E-11C4-D5AEB4B43AB3} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{02A84255-2F4A-367E-11C4-D5AEB4B43AB3}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32AF64F7-4F4E-1EAD-2364-84D07503693A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32AF64F7-4F4E-1EAD-2364-84D07503693A}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3e7e1e4be3743aa1dcdfb4855361eaaa_JaffaCakes118.dll" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3184 wrote to memory of 2816 3184 regsvr32.exe 83 PID 3184 wrote to memory of 2816 3184 regsvr32.exe 83 PID 3184 wrote to memory of 2816 3184 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3e7e1e4be3743aa1dcdfb4855361eaaa_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3e7e1e4be3743aa1dcdfb4855361eaaa_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:2816
-
Network
-
Remote address:8.8.8.8:53Request68.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request25.140.123.92.in-addr.arpaIN PTRResponse25.140.123.92.in-addr.arpaIN PTRa92-123-140-25deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request192.142.123.92.in-addr.arpaIN PTRResponse192.142.123.92.in-addr.arpaIN PTRa92-123-142-192deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request22.236.111.52.in-addr.arpaIN PTRResponse
No results found
-
71 B 157 B 1 1
DNS Request
68.32.126.40.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
25.140.123.92.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
192.142.123.92.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
22.236.111.52.in-addr.arpa
-