Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 23:07
Behavioral task
behavioral1
Sample
5e0f64ad5a2e1b2746cf53cc3873ea02_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e0f64ad5a2e1b2746cf53cc3873ea02_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5e0f64ad5a2e1b2746cf53cc3873ea02_JaffaCakes118.dll
-
Size
30KB
-
MD5
5e0f64ad5a2e1b2746cf53cc3873ea02
-
SHA1
ee6642d781562cecef715c1a010a80fb639681d6
-
SHA256
ec5d9840932325d223a72d791ecaff31335d0ae80f9a4b1b235f8ab41fb395e7
-
SHA512
5c175ff065cba5b2d3d3b4dff143d55b52a6d0bda4b27e40dbda54e7e450d02350eba68f39ee17fb35478112095230ef62ad61a7f5379328c07228886250f59a
-
SSDEEP
768:7ogYVYCjnn1aeIgg68QtFfThfhVbj9KAApsynbcuyD7Ua:7w6gg6ZLhf0Synouy8
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\msflxgrdf\Parameters\ServiceDll = "C:\\Windows\\system32\\msflxgrd.ocx.dll" rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 4564 svchost.exe 4564 svchost.exe -
resource yara_rule behavioral2/memory/2096-0-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/files/0x00090000000233b6-2.dat upx behavioral2/memory/4564-5-0x0000000000FD0000-0x0000000000FEB000-memory.dmp upx behavioral2/memory/2096-6-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/4564-7-0x0000000000FD0000-0x0000000000FEB000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msflxgrd.ocx.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\msflxgrd.ocx.dll rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 648 wrote to memory of 2096 648 rundll32.exe 83 PID 648 wrote to memory of 2096 648 rundll32.exe 83 PID 648 wrote to memory of 2096 648 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e0f64ad5a2e1b2746cf53cc3873ea02_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e0f64ad5a2e1b2746cf53cc3873ea02_JaffaCakes118.dll,#12⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
PID:2096
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:4564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD55e0f64ad5a2e1b2746cf53cc3873ea02
SHA1ee6642d781562cecef715c1a010a80fb639681d6
SHA256ec5d9840932325d223a72d791ecaff31335d0ae80f9a4b1b235f8ab41fb395e7
SHA5125c175ff065cba5b2d3d3b4dff143d55b52a6d0bda4b27e40dbda54e7e450d02350eba68f39ee17fb35478112095230ef62ad61a7f5379328c07228886250f59a