Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 04:58
Static task
static1
Behavioral task
behavioral1
Sample
84e153b09cdcf94c51fb28dd948c40ce_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
84e153b09cdcf94c51fb28dd948c40ce_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
84e153b09cdcf94c51fb28dd948c40ce
-
SHA1
a62a91ac31a93b7e788388017017dcaddafc2c50
-
SHA256
cae8edf96ad41267994ab6e5ed6831a50acf695c3a706f4b5fa0fbc41d9efc6d
-
SHA512
23fbe66b8768326e23f657d57e6643e38dd19d137c42594fb73c946680b3114871e20a1695fc58c979fe1de77f0eba4f9dda97c76828949a93d1cc24b306ac85
-
SSDEEP
24576:MuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:k9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1200-5-0x0000000002E00000-0x0000000002E01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 1608 eudcedit.exe 1772 DevicePairingWizard.exe 112 dvdupgrd.exe -
Loads dropped DLL 7 IoCs
pid Process 1200 Process not Found 1608 eudcedit.exe 1200 Process not Found 1772 DevicePairingWizard.exe 1200 Process not Found 112 dvdupgrd.exe 1200 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Neewpjodwhuy = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\NATIVE~1\\CCINBF~1\\DEVICE~1.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA eudcedit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dvdupgrd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2740 rundll32.exe 2740 rundll32.exe 2740 rundll32.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1200 wrote to memory of 480 1200 Process not Found 30 PID 1200 wrote to memory of 480 1200 Process not Found 30 PID 1200 wrote to memory of 480 1200 Process not Found 30 PID 1200 wrote to memory of 1608 1200 Process not Found 31 PID 1200 wrote to memory of 1608 1200 Process not Found 31 PID 1200 wrote to memory of 1608 1200 Process not Found 31 PID 1200 wrote to memory of 2068 1200 Process not Found 32 PID 1200 wrote to memory of 2068 1200 Process not Found 32 PID 1200 wrote to memory of 2068 1200 Process not Found 32 PID 1200 wrote to memory of 1772 1200 Process not Found 33 PID 1200 wrote to memory of 1772 1200 Process not Found 33 PID 1200 wrote to memory of 1772 1200 Process not Found 33 PID 1200 wrote to memory of 2988 1200 Process not Found 35 PID 1200 wrote to memory of 2988 1200 Process not Found 35 PID 1200 wrote to memory of 2988 1200 Process not Found 35 PID 1200 wrote to memory of 112 1200 Process not Found 36 PID 1200 wrote to memory of 112 1200 Process not Found 36 PID 1200 wrote to memory of 112 1200 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\84e153b09cdcf94c51fb28dd948c40ce_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
C:\Windows\system32\eudcedit.exeC:\Windows\system32\eudcedit.exe1⤵PID:480
-
C:\Users\Admin\AppData\Local\HRBHw\eudcedit.exeC:\Users\Admin\AppData\Local\HRBHw\eudcedit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1608
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵PID:2068
-
C:\Users\Admin\AppData\Local\75YOpu\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\75YOpu\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1772
-
C:\Windows\system32\dvdupgrd.exeC:\Windows\system32\dvdupgrd.exe1⤵PID:2988
-
C:\Users\Admin\AppData\Local\qKegH6aKU\dvdupgrd.exeC:\Users\Admin\AppData\Local\qKegH6aKU\dvdupgrd.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD530f33558b332ab9ccc947f18b6488148
SHA14e87d659a23ae3e0c2087fcb05d3e691a419556b
SHA25621a7bd95feaa7e53c7502301f77f3994848f187ea99956d39009bea0dd630bce
SHA5120711e233ea162cd57856f52ec3e8fd4303aefa4584a40533182d78ea774ccc5f9a1a830c45685281e48ddb910a34fd770a7b6ca9adef74afc81b1c5be88cb6eb
-
Filesize
1.2MB
MD5a00c4b7001e0b01c69e26005fc41b571
SHA190fd0f38a66e067cfd0d3de5b946c772ba8a08e4
SHA2560115ce421153a0265c972b03aac8defd4fdeeb74833a021c97cf56d0adef361f
SHA5127d6cd6c4a5c1feacaddd9c098b055e6b836896c299c5097fcd7ae52d5d2ca32e144382f9c0e19d08a442f6704124e1249e9b3374dd1ffbda6a6938eb5f211590
-
Filesize
1.2MB
MD57f9d9aaa11d2ed8f63d39911b503ab80
SHA130701ab00f8f7a75c64f55ef727fdede22134228
SHA256c512fba9e5714169dbbce31170d03a3512f87d600ed40ff6a4b9c5e5b0306f68
SHA512fec0f16f3e1a86d03b5acdcf69a3d9adacb5ded11cdb55cff08362d939493081ead3f4082a3f20e0a3392f471ac7bedc4bd1e5d2495ab8c61678581f22fd261a
-
Filesize
1KB
MD5049e00069ea40c3f32ff8788546e9db1
SHA160802630fa40f9007905bdaf26008bf23d200538
SHA2563c2685d48d917808fdde5687071d329b7037a5341a87864cc8cb59b776144305
SHA512536dbcb35398055869f4dbee2ef46bd8ca8f6233c6c511eed79edcb1a74ba54d5c49b81c898f202fde162d24192f6870a7132d8e4d4cf3728ae75254cb19e9a5
-
Filesize
73KB
MD59728725678f32e84575e0cd2d2c58e9b
SHA1dd9505d3548f08e5198a8d6ba6bcd60b1da86d5c
SHA256d95d3aa065a657c354244e3d9d4dc62673dc36c1bed60650fade7d128ddab544
SHA512a5d22240450e7b659cba507f9abe7e6d861e9712ca2335ea5ceb69e3557362b00f5d02bf84c3a6fed82a09eda555866dcab43741ad9c6db96e1e302ef2363377
-
Filesize
351KB
MD535e397d6ca8407b86d8a7972f0c90711
SHA16b39830003906ef82442522d22b80460c03f6082
SHA2561f64118bdc3515e8e9fce6ad182f6d0c8a6528d638fedb4901a6152cde4c7cde
SHA51271b0c4ac120e5841308b0c19718bdc28366b0d79c8177091328ef5421392b9ee5e4758816ffb8c0977f178e1b33ed064f64781eaf7d6952878dc8aea402f035e
-
Filesize
25KB
MD575a9b4172eac01d9648c6d2133af952f
SHA163c7e1af762d2b584e9cc841e8b0100f2a482b81
SHA25618f9f520c7157023b0e7dfe7433a63c4dedd47b04d24aac4038b795893050736
SHA5125a7a2c7f184efd9c84256a1a0a5e7aeb95432d63a567196be54e7a9437a5ada9b922983c5fc0cafb16eab4493665d8e56e2f646f9f6a2d6179986925ffcdf769