Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 08:58
Static task
static1
Behavioral task
behavioral1
Sample
73626110298d3b426842a568d229f973_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
73626110298d3b426842a568d229f973_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
73626110298d3b426842a568d229f973_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
73626110298d3b426842a568d229f973
-
SHA1
41c969ac320c272c172821d5b13e840697409392
-
SHA256
922f9ffedf68aca34e6e141db49d2bfc517ffdeb466faf7b6680b0c3e3d8f00c
-
SHA512
a724355aa29d517d9c2ca60a9177bf53c2b69b0cfb55477a51a93f5ee8a02efac5c2550d03ae3b2ea452c697ec40157c1953ace2b0f2b61fba4f6658c0de5f03
-
SSDEEP
24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs00r:SuNZ7Ib8ZBL2/Xs
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\dticem\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\73626110298d3b426842a568d229f973_JaffaCakes118.dll" regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\563c05e643.dll svchost.exe File opened for modification C:\Windows\SysWOW64\563c05e643.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2872 2608 regsvr32.exe 31 PID 2608 wrote to memory of 2872 2608 regsvr32.exe 31 PID 2608 wrote to memory of 2872 2608 regsvr32.exe 31 PID 2608 wrote to memory of 2872 2608 regsvr32.exe 31 PID 2608 wrote to memory of 2872 2608 regsvr32.exe 31 PID 2608 wrote to memory of 2872 2608 regsvr32.exe 31 PID 2608 wrote to memory of 2872 2608 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\73626110298d3b426842a568d229f973_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\73626110298d3b426842a568d229f973_JaffaCakes118.dll2⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
PID:2872
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k dtcGep1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123B
MD5f5069527a7b10d3fa9690746f70a7eb0
SHA1cb48da738745502e5ada261604622245d858de7f
SHA256ec1057da793c95fa70bc81cf2fb911f6a0cfbf85cfc753add036a425f39ad41e
SHA512f305d22e1603f8097c64e79bc9e1955eb1cc20a6a6d27d63058047b5a4abc309a1df604a404072eaa13381d3cfbb37d3e374e7f5bd5b283b98352b40a5af961c