Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
82ad4f64c89c3bbbd8cd8e53607071ea_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
82ad4f64c89c3bbbd8cd8e53607071ea_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
82ad4f64c89c3bbbd8cd8e53607071ea
-
SHA1
c93046e3777bdce827ecc58e9de0420ddc1cd5a1
-
SHA256
a594d78a5f1c9a6ca8d3b108513c84fcf4d12819dee46890074d5b0688120ac1
-
SHA512
aed739f5ebac5f5a5c34632e451d0a0c650227650361fe052dcdd7ee76466ad96c3df3eaeac66ddb98a09c7cf9a3ff717897b5e0ff6d8dfd03b86992bc29236d
-
SSDEEP
24576:muYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:G9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1116-5-0x0000000002DF0000-0x0000000002DF1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2664 Netplwiz.exe 2388 DeviceDisplayObjectProvider.exe 3032 wscript.exe -
Loads dropped DLL 8 IoCs
pid Process 1116 Process not Found 2664 Netplwiz.exe 1116 Process not Found 2388 DeviceDisplayObjectProvider.exe 1116 Process not Found 1116 Process not Found 3032 wscript.exe 1116 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qdgopofbxbljb = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\NETWOR~1\\VBXo0\\DEVICE~1.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Netplwiz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DeviceDisplayObjectProvider.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wscript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found 1116 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1116 wrote to memory of 2676 1116 Process not Found 30 PID 1116 wrote to memory of 2676 1116 Process not Found 30 PID 1116 wrote to memory of 2676 1116 Process not Found 30 PID 1116 wrote to memory of 2664 1116 Process not Found 31 PID 1116 wrote to memory of 2664 1116 Process not Found 31 PID 1116 wrote to memory of 2664 1116 Process not Found 31 PID 1116 wrote to memory of 396 1116 Process not Found 33 PID 1116 wrote to memory of 396 1116 Process not Found 33 PID 1116 wrote to memory of 396 1116 Process not Found 33 PID 1116 wrote to memory of 2388 1116 Process not Found 34 PID 1116 wrote to memory of 2388 1116 Process not Found 34 PID 1116 wrote to memory of 2388 1116 Process not Found 34 PID 1116 wrote to memory of 2924 1116 Process not Found 35 PID 1116 wrote to memory of 2924 1116 Process not Found 35 PID 1116 wrote to memory of 2924 1116 Process not Found 35 PID 1116 wrote to memory of 3032 1116 Process not Found 36 PID 1116 wrote to memory of 3032 1116 Process not Found 36 PID 1116 wrote to memory of 3032 1116 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82ad4f64c89c3bbbd8cd8e53607071ea_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
C:\Windows\system32\Netplwiz.exeC:\Windows\system32\Netplwiz.exe1⤵PID:2676
-
C:\Users\Admin\AppData\Local\j3FwB\Netplwiz.exeC:\Users\Admin\AppData\Local\j3FwB\Netplwiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2664
-
C:\Windows\system32\DeviceDisplayObjectProvider.exeC:\Windows\system32\DeviceDisplayObjectProvider.exe1⤵PID:396
-
C:\Users\Admin\AppData\Local\psrX9\DeviceDisplayObjectProvider.exeC:\Users\Admin\AppData\Local\psrX9\DeviceDisplayObjectProvider.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2388
-
C:\Windows\system32\wscript.exeC:\Windows\system32\wscript.exe1⤵PID:2924
-
C:\Users\Admin\AppData\Local\eshiDYnrK\wscript.exeC:\Users\Admin\AppData\Local\eshiDYnrK\wscript.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD52ee1777b4c0dc96c2512e03b684b0dbc
SHA1d53ec7e8902736120fc02dd93828f30dfa48524a
SHA256407dd8671d31147c96623cecbe089e1d047ec7595e642d1fdb484758f11c1ba1
SHA51225aa3a028c0c50772b0e4434c44a62db735ce0edefd1f3ed00e3f4b30926d0ea6bfcd1a5bb40d9e9cd4d0f3ca4bb4d648ea69b041dcc2f65d0c22d1dc92038ed
-
Filesize
165KB
MD58886e0697b0a93c521f99099ef643450
SHA1851bd390bf559e702b8323062dbeb251d9f2f6f7
SHA256d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f
SHA512fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837
-
Filesize
1.2MB
MD5a06a1ff1a6dd68513d4c12c0aba700bf
SHA12ede17c9a8c0a368aa8db4d2cee32d144ec194e9
SHA256c449db27f44a18d90537f3c19644db3615b9307b93290a2c427a9c0a8bb407c2
SHA51232c0d7cab4295c60d928e850b4f98bf9960d0b294a503adf474e96af8308b69223b13f4ea88e0a740d78f13575eee789f4f0d1cdaff69f194560791f880160b5
-
Filesize
1.2MB
MD5c92062f8b38776212c935dc048b4608c
SHA1e037c779c76eafacc7f0029edfd31b897a5bd1cd
SHA25649cfd2fdf31a4c58029c7ecdea38f6ebea8a624706397aff4eabaa38cfbe1b02
SHA51267c04bca0678808a95aea33f4bd1ec18bae45e9ae51ebe54928e4fc3e23cf06ebe190bf6dffd924da7aff4adc8bc1e526468641726512da572f496e911d94700
-
Filesize
1KB
MD5b600f085b5d1099c8f35175b169efd6f
SHA13bb058c888c92508093bda96c6c724419c4121ab
SHA256679324282caa16e2eddf1301af4e94ceeb43c3027d541c5870260ec728e20bb3
SHA51287b668976e87a84d73947ac007797b9490bdd0bc333a91bda855a7e7d7115f0563772122ecb98467697aa00803d6e4b7aa53af0799922f1a4d8084d693665594
-
Filesize
26KB
MD5e43ec3c800d4c0716613392e81fba1d9
SHA137de6a235e978ecf3bb0fc2c864016c5b0134348
SHA256636606415a85a16a7e6c5c8fcbdf35494991bce1c37dfc19c75ecb7ce12dc65c
SHA512176c6d8b87bc5a9ca06698e2542ff34d474bcbbf21278390127981366eda89769bd9dd712f3b34f4dd8332a0b40ee0e609276400f16b51999471c8ff24522a08
-
Filesize
109KB
MD57e2eb3a4ae11190ef4c8a9b9a9123234
SHA172e98687a8d28614e2131c300403c2822856e865
SHA2568481a8ec19cb656ce328c877d5817d317203ba34424a2e9d169ddce5bf2cd2b0
SHA51218b1a0637f48929972a463d441182307725ebf1410dd461a1966bd040ac5dcced138155b7c713bfc924ea2f7b39527a084a08b44fa24c3eb9c654871f99caabf