Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 04:41

General

  • Target

    ade4242e8a6dc97b07a8721c32f1e24b_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    ade4242e8a6dc97b07a8721c32f1e24b

  • SHA1

    9c9b2fd98d42b18fcf370261a1a333d5402491a1

  • SHA256

    7c3d1d4eb81a4963b448e3c15635cde7559bcdb2fbec800bfd5f852e6c6d7711

  • SHA512

    fdb6f2c28514da871fab214d9de9b7042dc966ff3967172648734c534c4577a7e67287c03498f5300783194152f30a56909daa8e84eaad19e580924f579ac079

  • SSDEEP

    24576:buYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:F9cKrUqZWLAcU

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ade4242e8a6dc97b07a8721c32f1e24b_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2988
  • C:\Windows\system32\msconfig.exe
    C:\Windows\system32\msconfig.exe
    1⤵
      PID:2796
    • C:\Users\Admin\AppData\Local\ioaPB\msconfig.exe
      C:\Users\Admin\AppData\Local\ioaPB\msconfig.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2600
    • C:\Windows\system32\notepad.exe
      C:\Windows\system32\notepad.exe
      1⤵
        PID:3024
      • C:\Users\Admin\AppData\Local\BTTkpN\notepad.exe
        C:\Users\Admin\AppData\Local\BTTkpN\notepad.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1924
      • C:\Windows\system32\rekeywiz.exe
        C:\Windows\system32\rekeywiz.exe
        1⤵
          PID:2856
        • C:\Users\Admin\AppData\Local\EbD0Fxf\rekeywiz.exe
          C:\Users\Admin\AppData\Local\EbD0Fxf\rekeywiz.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2792

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\BTTkpN\VERSION.dll

          Filesize

          1.2MB

          MD5

          4cbfe0955c07895ee50ba92de2df8967

          SHA1

          805aafb69d6c91bf7635937537a19fafafd9e62e

          SHA256

          04e44d7a1b236b59ee529de21b49a782f20c7e07e41fecdd930c3312e2824adb

          SHA512

          6f5ce6059e8f4a6278697e632698a2b7d63206074626d8850fb998eab773a77031613d03b20b22c0b5dd48213c1bd5caa0be3e4609d4fee4cbc5ca89dcab6e91

        • C:\Users\Admin\AppData\Local\EbD0Fxf\slc.dll

          Filesize

          1.2MB

          MD5

          6ba9b573acba0a2c85d9414aa4a77d1c

          SHA1

          8e45e1a14541ae5f6bd4ca92a126718e92f089ed

          SHA256

          42214cdfedbfc6bdbeb789efe7f920329d5f01051345e5686cda4c2dde77e536

          SHA512

          be2deb6f57d38dca7e9122f166fe5a54b10cc75c4c13e433959109d7b76022275abcb1d36f1638afa330948ec72546c91206838985f72ba9aef2dc0fbfed6040

        • C:\Users\Admin\AppData\Local\ioaPB\MFC42u.dll

          Filesize

          1.2MB

          MD5

          dfc44da585098a19baae29abde0af7a9

          SHA1

          13ee486b1f04ef7b01106006b117d5e90e5b28bb

          SHA256

          b0c00b565d415cba8eec22337c442bf99c5c767637455770fc2580f2bb673bae

          SHA512

          44399b0d7c66c2d516631a84eda3de1f602d1d1506234fd8eb913b0ae53b8e4c77d963d1cb1ad6fa285a4fc0b717752d1678a8dd31b1d1d728a706209fe8ee79

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Mityoyoyxpr.lnk

          Filesize

          1KB

          MD5

          fe0d2ef95f9f8f811a076b82fc49d72d

          SHA1

          626aa09660d63c9e34d59cea3b0e9b7f52cffec4

          SHA256

          6cb2a9ede118560b53642a7231c25a5e5215ad576c7908fa19667692c78d3947

          SHA512

          e552ab5383d3ebe8c519da3de756a3d7e4f85336f069141433c65fb24f1700212455a0414a210766b43450387e9e4c92dd377646216a71978038de3b0f263672

        • \Users\Admin\AppData\Local\BTTkpN\notepad.exe

          Filesize

          189KB

          MD5

          f2c7bb8acc97f92e987a2d4087d021b1

          SHA1

          7eb0139d2175739b3ccb0d1110067820be6abd29

          SHA256

          142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2

          SHA512

          2f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8

        • \Users\Admin\AppData\Local\EbD0Fxf\rekeywiz.exe

          Filesize

          67KB

          MD5

          767c75767b00ccfd41a547bb7b2adfff

          SHA1

          91890853a5476def402910e6507417d400c0d3cb

          SHA256

          bd70e504871a2ac1c883d19b87970c8d1b8b251c784bf777ba77ed764f5f2395

          SHA512

          f096043452a1aa213a5e4d62638de3ee4b0b3ad3d12b7ee0372d8c79e00e2e13b4fd0ebc4206bbdb5124bed292dd5b30ef1641288046ef835f89c332985154f9

        • \Users\Admin\AppData\Local\ioaPB\msconfig.exe

          Filesize

          293KB

          MD5

          e19d102baf266f34592f7c742fbfa886

          SHA1

          c9c9c45b7e97bb7a180064d0a1962429f015686d

          SHA256

          f3c8bb430f9c33e6caf06aaebde17b7fddcc55e8bb36cec2b9379038f1fca0b1

          SHA512

          1b9f1880dd3c26ae790b8eead641e73264f90dc7aa2645acc530aad20ad9d247db613e1725282c85bca98c4428ac255752a4f5c9b2a97f90908b7fe4167bb283

        • memory/1184-26-0x0000000077981000-0x0000000077982000-memory.dmp

          Filesize

          4KB

        • memory/1184-12-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1184-4-0x0000000077776000-0x0000000077777000-memory.dmp

          Filesize

          4KB

        • memory/1184-16-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1184-15-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1184-13-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1184-11-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1184-10-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1184-9-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1184-27-0x0000000077B10000-0x0000000077B12000-memory.dmp

          Filesize

          8KB

        • memory/1184-24-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1184-37-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1184-36-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1184-8-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1184-46-0x0000000077776000-0x0000000077777000-memory.dmp

          Filesize

          4KB

        • memory/1184-25-0x0000000002D30000-0x0000000002D37000-memory.dmp

          Filesize

          28KB

        • memory/1184-14-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1184-7-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1184-5-0x0000000002D50000-0x0000000002D51000-memory.dmp

          Filesize

          4KB

        • memory/1924-72-0x0000000000290000-0x0000000000297000-memory.dmp

          Filesize

          28KB

        • memory/1924-73-0x000007FEF6A70000-0x000007FEF6BA1000-memory.dmp

          Filesize

          1.2MB

        • memory/1924-78-0x000007FEF6A70000-0x000007FEF6BA1000-memory.dmp

          Filesize

          1.2MB

        • memory/2600-60-0x000007FEF6FE0000-0x000007FEF7117000-memory.dmp

          Filesize

          1.2MB

        • memory/2600-55-0x000007FEF6FE0000-0x000007FEF7117000-memory.dmp

          Filesize

          1.2MB

        • memory/2600-57-0x0000000000110000-0x0000000000117000-memory.dmp

          Filesize

          28KB

        • memory/2792-90-0x000007FEF6490000-0x000007FEF65C1000-memory.dmp

          Filesize

          1.2MB

        • memory/2792-93-0x00000000027D0000-0x00000000027D7000-memory.dmp

          Filesize

          28KB

        • memory/2792-96-0x000007FEF6490000-0x000007FEF65C1000-memory.dmp

          Filesize

          1.2MB

        • memory/2988-45-0x000007FEF6A80000-0x000007FEF6BB0000-memory.dmp

          Filesize

          1.2MB

        • memory/2988-0-0x000007FEF6A80000-0x000007FEF6BB0000-memory.dmp

          Filesize

          1.2MB

        • memory/2988-3-0x0000000000120000-0x0000000000127000-memory.dmp

          Filesize

          28KB