Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
6f581251b077985dc8d9e5a293fe6624_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6f581251b077985dc8d9e5a293fe6624_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6f581251b077985dc8d9e5a293fe6624_JaffaCakes118.exe
-
Size
42KB
-
MD5
6f581251b077985dc8d9e5a293fe6624
-
SHA1
bfb2b157cfedef2bc78a8d0f0d6cc7a3236999ff
-
SHA256
2a11da22e08b480d6253135552311cbf11388029501b389a738778cd14feef17
-
SHA512
c699feb88138c9110367296cbb27933102d91b308d4c374e3680cc8d7fcc9973a07d08b0ce9092569c1202ac473e8aa83c1b5da469b224e14c640442e28c72e3
-
SSDEEP
768:2BKnK9R2tLDbuRoIrRNYbB9FNabpRgV3xlRhgbw0T5TVGfV6xzCH3cKkAGOsXdR1:2BNeLH8PrPYbTXa8Jxrh4vT5T0fjH3qD
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2456 rundll32.exe 2456 rundll32.exe 2456 rundll32.exe 2456 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Fvupovo = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\NESDSexi.dll\",Startup" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f581251b077985dc8d9e5a293fe6624_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2520 3012 6f581251b077985dc8d9e5a293fe6624_JaffaCakes118.exe 29 PID 3012 wrote to memory of 2520 3012 6f581251b077985dc8d9e5a293fe6624_JaffaCakes118.exe 29 PID 3012 wrote to memory of 2520 3012 6f581251b077985dc8d9e5a293fe6624_JaffaCakes118.exe 29 PID 3012 wrote to memory of 2520 3012 6f581251b077985dc8d9e5a293fe6624_JaffaCakes118.exe 29 PID 3012 wrote to memory of 2520 3012 6f581251b077985dc8d9e5a293fe6624_JaffaCakes118.exe 29 PID 3012 wrote to memory of 2520 3012 6f581251b077985dc8d9e5a293fe6624_JaffaCakes118.exe 29 PID 3012 wrote to memory of 2520 3012 6f581251b077985dc8d9e5a293fe6624_JaffaCakes118.exe 29 PID 2520 wrote to memory of 2456 2520 rundll32.exe 30 PID 2520 wrote to memory of 2456 2520 rundll32.exe 30 PID 2520 wrote to memory of 2456 2520 rundll32.exe 30 PID 2520 wrote to memory of 2456 2520 rundll32.exe 30 PID 2520 wrote to memory of 2456 2520 rundll32.exe 30 PID 2520 wrote to memory of 2456 2520 rundll32.exe 30 PID 2520 wrote to memory of 2456 2520 rundll32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f581251b077985dc8d9e5a293fe6624_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6f581251b077985dc8d9e5a293fe6624_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Users\Admin\AppData\Local\NESDSexi.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\NESDSexi.dll",iep3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2456
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5604b005a3e92b2b12940d4e296041727
SHA138cbfd301b8117bbbe8ccb36284451cf21782723
SHA25633856827a6869b76e80851ec1ab52c036dfa7d0788e1ab99c0abf08abc002b4c
SHA51286a448d4c1de3352b17f7a534904c30d5410634517201d3f3cc093718053ee7d38e41c2e0afc2408613415f358b33238172247b712f87f40ac72882f8aa6e107