Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 00:42
Static task
static1
Behavioral task
behavioral1
Sample
a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.dll
-
Size
669KB
-
MD5
a8e2c77a0c9daf5f0b497726d57f6cd6
-
SHA1
8adf06efed9a04ebebb5ca102c0f7a6b59877a87
-
SHA256
96a7d01f77d139673b07d078e9e1915317b97b618ac376e8d5c6fc2ef59e32bc
-
SHA512
9a73b765a7483e4b82c4f02839c7afe3a98955633757cf320440b2d099fdec1193c4ea739107763911db43327048d779b24aba1ea1ed92a6e426d448fae53479
-
SSDEEP
12288:tIukUn4HHRaIsGyLmOtEAtk/1+JsHgWl9/XHYmBZu2Uogz/fO79s:trkM4nAJDL/yLHgw/XHYmBE2xgr
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-58D5-92F5-F1EF-1E8317656579} regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.axc\ = "axc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.axc\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.axc\Clsid\ = "{CC01FC6C-58D5-92F5-F1EF-1E8317656579}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-58D5-92F5-F1EF-1E8317656579}\ProgID\ = "a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.axc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-58D5-92F5-F1EF-1E8317656579}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-58D5-92F5-F1EF-1E8317656579}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-58D5-92F5-F1EF-1E8317656579}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.axc regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-58D5-92F5-F1EF-1E8317656579}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-58D5-92F5-F1EF-1E8317656579} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-58D5-92F5-F1EF-1E8317656579}\ = "axc" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2004 2212 regsvr32.exe 30 PID 2212 wrote to memory of 2004 2212 regsvr32.exe 30 PID 2212 wrote to memory of 2004 2212 regsvr32.exe 30 PID 2212 wrote to memory of 2004 2212 regsvr32.exe 30 PID 2212 wrote to memory of 2004 2212 regsvr32.exe 30 PID 2212 wrote to memory of 2004 2212 regsvr32.exe 30 PID 2212 wrote to memory of 2004 2212 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2004
-