Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 13:09
Static task
static1
Behavioral task
behavioral1
Sample
41cdf3404ce9ac555953fa1287c81a9b_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
41cdf3404ce9ac555953fa1287c81a9b_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
41cdf3404ce9ac555953fa1287c81a9b_JaffaCakes118.dll
-
Size
22KB
-
MD5
41cdf3404ce9ac555953fa1287c81a9b
-
SHA1
55ba0c820ebc4fd4eb66e85c44a35fe55f4a8a4e
-
SHA256
3f55c4f1d5cdc3591b1546231e93e8ae3b4587e3c55c7d1f3786a20f54d9aafb
-
SHA512
3242ae0464dd3b03d65e9531bebc5c7687d7b89273ba0421d4f9f380dc9d5f19b6193324605a850a1a6d1cfd813442ecd2dc975bcc6e6733f65f25660e598c9a
-
SSDEEP
384:fzvQeo/3/ujvi6VB18OqrurUEb8KE9sWQmTPchXFLScQwt:fzXoWjvt18281sWnTPcHLScB
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 4476 rundll32.exe 4476 rundll32.exe 1868 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSServer = "rundll32.exe C:\\Windows\\system32\\mlJDwXrS.dll,#1" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\mlJDwXrS.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\mlJDwXrS.dll rundll32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{120BB507-7E43-46F1-8645-7BF4E4E11112} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{120BB507-7E43-46F1-8645-7BF4E4E11112}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{120BB507-7E43-46F1-8645-7BF4E4E11112}\InprocServer32\ = "C:\\Windows\\SysWow64\\mlJDwXrS.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{120BB507-7E43-46F1-8645-7BF4E4E11112}\InprocServer32\ThreadingModel = "Both" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4476 rundll32.exe 4476 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4476 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4476 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4476 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1092 wrote to memory of 4476 1092 rundll32.exe 83 PID 1092 wrote to memory of 4476 1092 rundll32.exe 83 PID 1092 wrote to memory of 4476 1092 rundll32.exe 83 PID 4476 wrote to memory of 624 4476 rundll32.exe 5 PID 4476 wrote to memory of 1868 4476 rundll32.exe 89 PID 4476 wrote to memory of 1868 4476 rundll32.exe 89 PID 4476 wrote to memory of 1868 4476 rundll32.exe 89
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:624
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\41cdf3404ce9ac555953fa1287c81a9b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\41cdf3404ce9ac555953fa1287c81a9b_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\mlJDwXrS.dll,a3⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD541cdf3404ce9ac555953fa1287c81a9b
SHA155ba0c820ebc4fd4eb66e85c44a35fe55f4a8a4e
SHA2563f55c4f1d5cdc3591b1546231e93e8ae3b4587e3c55c7d1f3786a20f54d9aafb
SHA5123242ae0464dd3b03d65e9531bebc5c7687d7b89273ba0421d4f9f380dc9d5f19b6193324605a850a1a6d1cfd813442ecd2dc975bcc6e6733f65f25660e598c9a