Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
ac05f3e3c0774eac69ed06a6d2cbb543_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
ac05f3e3c0774eac69ed06a6d2cbb543_JaffaCakes118.dll
-
Size
436KB
-
MD5
ac05f3e3c0774eac69ed06a6d2cbb543
-
SHA1
48f8b34ec60a0469c03f4ced8250720cde961383
-
SHA256
cb6ffd40086f791f484e4e35e2a3fbf0fdf112cd6f9f749478e831ac8e8e1106
-
SHA512
0c20771add113db39b4b753e7cfd6458cbf0dd7b81cfb0f73a9a0d471acd9dd6c76668c0b8a478c273798466869f8ca4ef0154e6f29f2df969540ee69f7682f3
-
SSDEEP
12288:6Kc3Y0IDPO3RZIqOVCUlcOQ+tuYw7dmvxdtLMkOa:zcI0I2ZIqzcu+vw7QxLv
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 6 2872 rundll32.exe 9 2872 rundll32.exe 12 2872 rundll32.exe 13 2872 rundll32.exe 15 2872 rundll32.exe 16 2872 rundll32.exe -
Deletes itself 1 IoCs
pid Process 2804 cmd.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Wine rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Wine rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 2872 rundll32.exe 2872 rundll32.exe 2872 rundll32.exe 2872 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDLL (uthn.exe) = "rundll32.exe C:\\Windows\\system32\\uthn.exe,start" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\uthn.exe rundll32.exe File opened for modification C:\Windows\SysWOW64\uthn.exe rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2544 rundll32.exe 2872 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2544 rundll32.exe 2872 rundll32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1400 wrote to memory of 2544 1400 rundll32.exe 29 PID 1400 wrote to memory of 2544 1400 rundll32.exe 29 PID 1400 wrote to memory of 2544 1400 rundll32.exe 29 PID 1400 wrote to memory of 2544 1400 rundll32.exe 29 PID 1400 wrote to memory of 2544 1400 rundll32.exe 29 PID 1400 wrote to memory of 2544 1400 rundll32.exe 29 PID 1400 wrote to memory of 2544 1400 rundll32.exe 29 PID 2544 wrote to memory of 2872 2544 rundll32.exe 30 PID 2544 wrote to memory of 2872 2544 rundll32.exe 30 PID 2544 wrote to memory of 2872 2544 rundll32.exe 30 PID 2544 wrote to memory of 2872 2544 rundll32.exe 30 PID 2544 wrote to memory of 2872 2544 rundll32.exe 30 PID 2544 wrote to memory of 2872 2544 rundll32.exe 30 PID 2544 wrote to memory of 2872 2544 rundll32.exe 30 PID 2544 wrote to memory of 2804 2544 rundll32.exe 31 PID 2544 wrote to memory of 2804 2544 rundll32.exe 31 PID 2544 wrote to memory of 2804 2544 rundll32.exe 31 PID 2544 wrote to memory of 2804 2544 rundll32.exe 31 PID 2544 wrote to memory of 2804 2544 rundll32.exe 31 PID 2544 wrote to memory of 2804 2544 rundll32.exe 31 PID 2544 wrote to memory of 2804 2544 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac05f3e3c0774eac69ed06a6d2cbb543_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac05f3e3c0774eac69ed06a6d2cbb543_JaffaCakes118.dll,#12⤵
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\system32\uthn.exe,start3⤵
- Blocklisted process makes network request
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\uninstall.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD5f0b3750267e29ff676a8cb03e6f76a7f
SHA14b43415c9dbd0fa26b2b97fc0cc6fd9efca3d4fa
SHA25689f13c4cfffa54f260efd7ba7ab7110dcadef405b80038b107965b360aa1ebf1
SHA5125ba5add9a1dd979d868c4a716c7590a8c02ca1fa656447c0e4caf79214ed83d594d2b1bec23dd71ba0a2ecc1dc4a0a78757bca51383475240d9b29b328432a7b
-
Filesize
436KB
MD5ac05f3e3c0774eac69ed06a6d2cbb543
SHA148f8b34ec60a0469c03f4ced8250720cde961383
SHA256cb6ffd40086f791f484e4e35e2a3fbf0fdf112cd6f9f749478e831ac8e8e1106
SHA5120c20771add113db39b4b753e7cfd6458cbf0dd7b81cfb0f73a9a0d471acd9dd6c76668c0b8a478c273798466869f8ca4ef0154e6f29f2df969540ee69f7682f3