Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe
-
Size
44KB
-
MD5
41183474b0523f53cf3a3af1e4833d69
-
SHA1
94e6fc55359991f49c63a4766271801887031523
-
SHA256
7ad1db7f7c01e377d913bfc35da1261711dda5fed2ce98bebf4f0b3339d13678
-
SHA512
147e0a87dd2ff3769630f8804de6384e0c909f679845753017ec9e1a9e2496996026cf3a01f975d810b7c31666fcc2784937228be72dbfb0cb9a24362cfb42e4
-
SSDEEP
768:jd1we/uuyLvYbPAyquazHlOKoSOdWv/QK/APitFoY2P2:/w7vY7AyvKH8KvujK6K42
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2068 41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe 5016 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSServer = "rundll32.exe C:\\Windows\\system32\\qoMdDvVl.dll,#1" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\pmnmnNgE.dll 41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe File created C:\Windows\SysWOW64\pmnmnNgE.dll 41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe File created C:\Windows\SysWOW64\qoMdDvVl.dll 41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\qoMdDvVl.dll 41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1A4BA860-573E-4059-8337-6A34AC65C535} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1A4BA860-573E-4059-8337-6A34AC65C535}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1A4BA860-573E-4059-8337-6A34AC65C535}\InprocServer32\ = "C:\\Windows\\SysWow64\\qoMdDvVl.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1A4BA860-573E-4059-8337-6A34AC65C535}\InprocServer32\ThreadingModel = "Both" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2068 41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe 2068 41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe 5016 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2068 41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2068 41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2068 wrote to memory of 616 2068 41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe 5 PID 2068 wrote to memory of 5016 2068 41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe 94 PID 2068 wrote to memory of 5016 2068 41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe 94 PID 2068 wrote to memory of 5016 2068 41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe 94 PID 2068 wrote to memory of 2088 2068 41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe 95 PID 2068 wrote to memory of 2088 2068 41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe 95 PID 2068 wrote to memory of 2088 2068 41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe 95
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\qoMdDvVl.dll,a2⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\removalfile.bat "C:\Users\Admin\AppData\Local\Temp\41183474b0523f53cf3a3af1e4833d69_JaffaCakes118.exe"2⤵PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43B
MD59a7ef09167a6f4433681b94351509043
SHA1259b1375ed8e84943ca1d42646bb416325c89e12
SHA256d5739a0510d89da572eb0b0d394d4fb4dd361cd9ee0144b9b31c590df93c3be7
SHA51296b84cd88a0e4b7c1122af3ed6ce5edf0a9a4e9bf79575eadfac16b2c46f1278d57755d29f21d7c6dcb4403be24b7ac7da4837c6cc9c602342a8f2b8e54883df
-
Filesize
33KB
MD582710a04099d2ec3bc08aa1049d8c4c2
SHA14d2bec1db38e0c821909a1a5a1a27fc06ce2cb77
SHA25689de92effc5972c6f9acdc199076126da020d8d551f6ef3a0ec3dc1f8c2cbf0a
SHA51272dd97860a355b23cfa90dc9c2cffae122e0624e55c2d820d81ca7247dd4b613d5af0f4c2d3b509b1eb0728bc69c0c7967436feb90ddac299f94d827a849813f