Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 04:12
Static task
static1
Behavioral task
behavioral1
Sample
4442cd457989e56b075c2d7a73900beb_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4442cd457989e56b075c2d7a73900beb_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4442cd457989e56b075c2d7a73900beb_JaffaCakes118.dll
-
Size
122KB
-
MD5
4442cd457989e56b075c2d7a73900beb
-
SHA1
ac1eb7ba4b2dfc5a6dfe091474ee6b2fe58e3f49
-
SHA256
73b79595b268e8bafe6994eb88d9186d2a30b296c8843c9731a2d74310589fb0
-
SHA512
6f552d8749bf1c019ed04d059577a8962d8b13722a13c8c55e4722860e75cb5a6caf33a5f64c982d31f4de2e078e441190be731c077955fe17877ac2f237be34
-
SSDEEP
3072:7nbJpEypKc+JjCc3Jcy006iSmmG/6icKdYlO1:LbJpd6GcOrmmi9cKd2O1
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 2 4604 rundll32.exe 3 4604 rundll32.exe 8 4604 rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Y93o7oC.sys\imagepath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Y93o7oC.sys" rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3376 4604 WerFault.exe 83 -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4604 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4604 rundll32.exe Token: SeTakeOwnershipPrivilege 4604 rundll32.exe Token: SeImpersonatePrivilege 4604 rundll32.exe Token: SeAssignPrimaryTokenPrivilege 4604 rundll32.exe Token: SeLoadDriverPrivilege 4604 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3040 wrote to memory of 4604 3040 rundll32.exe 83 PID 3040 wrote to memory of 4604 3040 rundll32.exe 83 PID 3040 wrote to memory of 4604 3040 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4442cd457989e56b075c2d7a73900beb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4442cd457989e56b075c2d7a73900beb_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 19523⤵
- Program crash
PID:3376
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4604 -ip 46041⤵PID:2356