Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 10:55
Static task
static1
Behavioral task
behavioral1
Sample
85ca9b6e2d3628cea4badad665e74407_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
85ca9b6e2d3628cea4badad665e74407_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
85ca9b6e2d3628cea4badad665e74407_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
85ca9b6e2d3628cea4badad665e74407
-
SHA1
951a6bd5f11a3e473a5e13b4cd9d76e1d8128fa5
-
SHA256
09fb14c04c646802ded6085bf57fd6afd60d168d570cfed4db4ff7e820d0db72
-
SHA512
b3fa6263f5fd2e72dd20b36100e2272cb823f899123525bb7176acfeb481aadde026ab5edf8163a51aba7236008cd3ec3aa3419f0d779052ed35b23975c1cd66
-
SSDEEP
24576:QuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N9t:A9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1228-5-0x0000000002D50000-0x0000000002D51000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2780 msdtc.exe 1684 rdpclip.exe 2092 TpmInit.exe -
Loads dropped DLL 7 IoCs
pid Process 1228 Process not Found 2780 msdtc.exe 1228 Process not Found 1684 rdpclip.exe 1228 Process not Found 2092 TpmInit.exe 1228 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mcbsdqtxprcnbm = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\#SHARE~1\\hqcK\\rdpclip.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdtc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpclip.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TpmInit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2360 rundll32.exe 2360 rundll32.exe 2360 rundll32.exe 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1228 wrote to memory of 2576 1228 Process not Found 31 PID 1228 wrote to memory of 2576 1228 Process not Found 31 PID 1228 wrote to memory of 2576 1228 Process not Found 31 PID 1228 wrote to memory of 2780 1228 Process not Found 32 PID 1228 wrote to memory of 2780 1228 Process not Found 32 PID 1228 wrote to memory of 2780 1228 Process not Found 32 PID 1228 wrote to memory of 3012 1228 Process not Found 33 PID 1228 wrote to memory of 3012 1228 Process not Found 33 PID 1228 wrote to memory of 3012 1228 Process not Found 33 PID 1228 wrote to memory of 1684 1228 Process not Found 34 PID 1228 wrote to memory of 1684 1228 Process not Found 34 PID 1228 wrote to memory of 1684 1228 Process not Found 34 PID 1228 wrote to memory of 1992 1228 Process not Found 35 PID 1228 wrote to memory of 1992 1228 Process not Found 35 PID 1228 wrote to memory of 1992 1228 Process not Found 35 PID 1228 wrote to memory of 2092 1228 Process not Found 36 PID 1228 wrote to memory of 2092 1228 Process not Found 36 PID 1228 wrote to memory of 2092 1228 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\85ca9b6e2d3628cea4badad665e74407_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
C:\Windows\system32\msdtc.exeC:\Windows\system32\msdtc.exe1⤵PID:2576
-
C:\Users\Admin\AppData\Local\NdZqUV\msdtc.exeC:\Users\Admin\AppData\Local\NdZqUV\msdtc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2780
-
C:\Windows\system32\rdpclip.exeC:\Windows\system32\rdpclip.exe1⤵PID:3012
-
C:\Users\Admin\AppData\Local\sa3\rdpclip.exeC:\Users\Admin\AppData\Local\sa3\rdpclip.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1684
-
C:\Windows\system32\TpmInit.exeC:\Windows\system32\TpmInit.exe1⤵PID:1992
-
C:\Users\Admin\AppData\Local\w7wLGNo\TpmInit.exeC:\Users\Admin\AppData\Local\w7wLGNo\TpmInit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5984ff6bcd7b62254bb7c99ab04a7c03d
SHA13896cf396151768a03a4edfb493b1077e80fb646
SHA25633c521bb96514b53157a51e3d5495939e245384544880f55f01b204c682c029f
SHA512dccd45e3af6d2560587e22fdbf31a1fa5c1d006df9023ae84c64412e1296f15c06b0a83f1e1442f46068fe5437078a3b7cab79df53a241c5b7969c9e28eb8baa
-
Filesize
1.2MB
MD558373b73bd7f56f7e0be202ed1c8a41f
SHA134fe46e13a9f52eeffeed8792de7535cb286ce41
SHA25655452229621d68f87fb87f96852ef10d84adc97e05ce0afc1837c086583ca3cf
SHA5126ba1c8089adbc908a4839d33c97e5d4a0d04a88df5589cb601c47efd1f5c219ce63dce7a066d87275349b8d9bc9947bd1e941f675b27fd30dafe0bd7e8bae166
-
Filesize
1.2MB
MD547131ba58417ad96aa7b4ee6b4c06193
SHA146e1fff3b75164d752fd4c88d119d3f221f53941
SHA2569c0f50c8a847a971597040cb963658f3348238e03cf37b0135893df549291e41
SHA5124e0b08d4f583c13ec755197639c9b1fcd629089c442ba6829a0fde1d4b9906e37d38a31d61f21e27f1eda11e5b09ac6abf302d6ddfa0fe8068f059884ae33a40
-
Filesize
112KB
MD58b5eb38e08a678afa129e23129ca1e6d
SHA1a27d30bb04f9fabdb5c92d5150661a75c5c7bc42
SHA2564befa614e1b434b2f58c9e7ce947a946b1cf1834b219caeff42b3e36f22fd97c
SHA512a7245cde299c68db85370ae1bdf32a26208e2cda1311afd06b0efd410664f36cafb62bf4b7ce058e203dcc515c45ebdef01543779ead864f3154175b7b36647d
-
Filesize
887B
MD5b022e17c596472535197cb7a965e15b9
SHA1110d0833d327c8d1f48699948191f33ed58bbc45
SHA256f71d0fa0c0f7adbe04f89d80394833dabb54d09081d80e36544e2a3ae5297d53
SHA51257e49fe84514f95896109ac1a982c3222dd898c106891011d93fd43bdc97f44cd8a0995d86c78ef06f1fbf9d7d90700b791882f28cce146a17260cd6b12ba95a
-
Filesize
138KB
MD5de0ece52236cfa3ed2dbfc03f28253a8
SHA184bbd2495c1809fcd19b535d41114e4fb101466c
SHA2562fbbec4cacb5161f68d7c2935852a5888945ca0f107cf8a1c01f4528ce407de3
SHA51269386134667626c60c99d941c8ab52f8e5235e3897b5af76965572287afd5dcd42b8207a520587844a57a268e4decb3f3c550e5b7a06230ee677dc5e40c50bb3
-
Filesize
206KB
MD525d284eb2f12254c001afe9a82575a81
SHA1cf131801fdd5ec92278f9e0ae62050e31c6670a5
SHA256837e0d864c474956c0d9d4e7ae5f884007f19b7f420db9afcf0d266aefa6608b
SHA5127b4f208fa1681a0a139577ebc974e7acfc85e3c906a674e111223783460585eb989cb6b38f215d79f89e747a0e9224d90e1aa43e091d2042edb8bac7b27b968b