Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 20:43

General

  • Target

    68db993d1b23fbce4b71ad8c05e8cfaf_JaffaCakes118.dll

  • Size

    39KB

  • MD5

    68db993d1b23fbce4b71ad8c05e8cfaf

  • SHA1

    8d49e8e4bef7abb1823f10372ad7e6fddb781f51

  • SHA256

    ed880df7c3671bf062e5f265a4589eb9ea0b8bc4eefbbfb68ae397f3efaa350a

  • SHA512

    b44414d7d47bae45513180c2beaab87783c388ac222f834f30edd1bffb11e491481158e9e2868376459d2253dc2cbe992fbb196948f375573363b15606740b8e

  • SSDEEP

    768:deYGrQrbhLX5iq0vPdz2lo1uYJju+gutmpwf+kL:dehrsFLX8xvPIa1NjJXm6t

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 20 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 14 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\68db993d1b23fbce4b71ad8c05e8cfaf_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\68db993d1b23fbce4b71ad8c05e8cfaf_JaffaCakes118.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\se.dll,DllInstall
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\se.dll

    Filesize

    18KB

    MD5

    1b2c38aa1856c294b37ac2f56521cb8f

    SHA1

    e2ff5777bea613ba20fe4295bfd8eaf6d910d00c

    SHA256

    efd557516e52bad0fc6ea0daf9bc97ec88dace26d4bb73a5ed4780071da746af

    SHA512

    224c5398d0b427f32d284b0f2eb82b9b3ea0a8b72c5ef4f6b6de3da8e437be40b8ce64232fd995ddb0858b77735df2df274bec571d9f4ad00a009e89a062a289