Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 11:12
Static task
static1
Behavioral task
behavioral1
Sample
49886a0f6a78612ac7e7d35a7deb0f53_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
49886a0f6a78612ac7e7d35a7deb0f53_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
49886a0f6a78612ac7e7d35a7deb0f53_JaffaCakes118.exe
-
Size
128KB
-
MD5
49886a0f6a78612ac7e7d35a7deb0f53
-
SHA1
2519a3834bf10bec08cb6b5d9612108366a5e7c4
-
SHA256
8e8e41de3cf669a05f12f0d3d981a0653c20b7f688724491021728a7023ad195
-
SHA512
3f557bc3a96aebb1f4116f21f2d60b2c837837411f7e76007c27f0daa5939a055728029b6637273f8c65a7b8163c1f1fc4adcc1354ab5dc1ee7809e1ba29343e
-
SSDEEP
3072:/RkHRhqukTedU3M4qT+fpf1y7OlRXJdgMluoeolg:/uHuDYU3zqT8LgMluo
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3636 rundll32.exe 748 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Lzilugof = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Sowice.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3636 rundll32.exe 3636 rundll32.exe 3636 rundll32.exe 3636 rundll32.exe 3636 rundll32.exe 3636 rundll32.exe 3636 rundll32.exe 3636 rundll32.exe 3636 rundll32.exe 3636 rundll32.exe 3636 rundll32.exe 3636 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2564 49886a0f6a78612ac7e7d35a7deb0f53_JaffaCakes118.exe 3636 rundll32.exe 748 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2564 wrote to memory of 3636 2564 49886a0f6a78612ac7e7d35a7deb0f53_JaffaCakes118.exe 84 PID 2564 wrote to memory of 3636 2564 49886a0f6a78612ac7e7d35a7deb0f53_JaffaCakes118.exe 84 PID 2564 wrote to memory of 3636 2564 49886a0f6a78612ac7e7d35a7deb0f53_JaffaCakes118.exe 84 PID 3636 wrote to memory of 748 3636 rundll32.exe 91 PID 3636 wrote to memory of 748 3636 rundll32.exe 91 PID 3636 wrote to memory of 748 3636 rundll32.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\49886a0f6a78612ac7e7d35a7deb0f53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\49886a0f6a78612ac7e7d35a7deb0f53_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Sowice.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Sowice.dll",iep3⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD591fef4a3f0286ec1a0a9e04b26f63e64
SHA1b6b117e033e169a5834669172d8b3c9c263d19e7
SHA25673d7caa5adb429cf0f0fc5e54fa93c31994e89bea34c5c00d93a81b5f7a58121
SHA512478e93bd0646078af870d9e41e1c3454deffcbb03dd1e1f1a1218ae0f6f8939143393a38b9465d457d8110a11b1b5597996baff2020f5c1c4cdd6b642cda541f