Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2024, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
81e07dcd4aba843776a775f6b2797022_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
81e07dcd4aba843776a775f6b2797022_JaffaCakes118.dll
Resource
win10v2004-20240730-en
General
-
Target
81e07dcd4aba843776a775f6b2797022_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
81e07dcd4aba843776a775f6b2797022
-
SHA1
7e8e46a2a8cb9a61b70e39d1c6c89b1e5d4f64fa
-
SHA256
65bf49a9e9c65dc613814fa4a1eb2067cf7029e285205114a12784a5f741d1a8
-
SHA512
19ce1fe5dcf6a873626eb85663f5f10c19be23b711a7c2eb2687af47876bb74659922cdde1dc841f8fc6346cebb055952315d003c1e61f42c206675f6422b1bd
-
SSDEEP
24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs00V:SuNZ7Ib8ZBL2/Xm
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\dticem\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\81e07dcd4aba843776a775f6b2797022_JaffaCakes118.dll" regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\229f327652.dll svchost.exe File opened for modification C:\Windows\SysWOW64\229f327652.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3636 wrote to memory of 2628 3636 regsvr32.exe 83 PID 3636 wrote to memory of 2628 3636 regsvr32.exe 83 PID 3636 wrote to memory of 2628 3636 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\81e07dcd4aba843776a775f6b2797022_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\81e07dcd4aba843776a775f6b2797022_JaffaCakes118.dll2⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
PID:2628
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k dtcGep -s dticem1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135B
MD5ca56dff9beaee24550bf05e947a79aad
SHA13458af823eab8f587597455dca5cb991c83a022b
SHA2561a358bcff3741e0118fec0e974c0a19cdd7ab578d85b6de5558348206bfa6f30
SHA512ed19adb5758ead66b39ad9a132fe0351c13c41fc383f335470395f01cdb9ce7848f06a6b59efc2993d22f52b68a2c03a47e297a86e386ea3a10cd33c2c801c30
-
Filesize
114B
MD50198f7286e628e0c235a08499dffffd5
SHA162550d17b0340f8db997419263c5c30a0be4ed14
SHA256d4873bde01d02be6672882b8b3a246ff89efd07b6c205626e43f5835b2cd0056
SHA5123b8c8b89fe05fd3cec3c928888acc2489ae7cf4b07062cd26e18a0fa861b00d1997b6fd9270105ad27d1df891f1e478ffd3cf6a2dbd4a5aa406e22062eb1370c