Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
768ed5436356b89ebbc561a41af13231_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
768ed5436356b89ebbc561a41af13231_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
768ed5436356b89ebbc561a41af13231_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
768ed5436356b89ebbc561a41af13231
-
SHA1
57ccaee0a155928d41b47cb2e378a74313f3fec4
-
SHA256
e2fd441f589ab222ee61ad0125804926170d2377d5b9f4f947c3a24fd8f1364c
-
SHA512
389e2b6e97e797ef514c27257da11cd0c70877717fb48f61ef7973a574de27d79269b633142f839f0303b82ae5f78c400f0bb734b9b5e7455e60eef6d5f49889
-
SSDEEP
24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs00z:SuNZ7Ib8ZBL2/X0
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\dticem\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\768ed5436356b89ebbc561a41af13231_JaffaCakes118.dll" regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\7ecedfa405.dll svchost.exe File opened for modification C:\Windows\SysWOW64\7ecedfa405.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3680 wrote to memory of 3100 3680 regsvr32.exe 83 PID 3680 wrote to memory of 3100 3680 regsvr32.exe 83 PID 3680 wrote to memory of 3100 3680 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\768ed5436356b89ebbc561a41af13231_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\768ed5436356b89ebbc561a41af13231_JaffaCakes118.dll2⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
PID:3100
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k dtcGep -s dticem1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114B
MD503fa3e23a0a1a419c865017b70b2698a
SHA174b8f8244efe4f31f2019fde4559e75e83834e9e
SHA25614710182f19137d8eebc741e2131d099983d7160292393ceaea350379e83852d
SHA512f8ed55dccf1e36f2c30575947cfad326b7050153f4aa024673ab5479c6260393ae003d81773160a20ff502c9a9cc547803fd7bd5bc7ff6739bace74125146f9f