Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
ade4242e8a6dc97b07a8721c32f1e24b_JaffaCakes118.dll
Resource
win7-20240705-en
General
-
Target
ade4242e8a6dc97b07a8721c32f1e24b_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
ade4242e8a6dc97b07a8721c32f1e24b
-
SHA1
9c9b2fd98d42b18fcf370261a1a333d5402491a1
-
SHA256
7c3d1d4eb81a4963b448e3c15635cde7559bcdb2fbec800bfd5f852e6c6d7711
-
SHA512
fdb6f2c28514da871fab214d9de9b7042dc966ff3967172648734c534c4577a7e67287c03498f5300783194152f30a56909daa8e84eaad19e580924f579ac079
-
SSDEEP
24576:buYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:F9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3444-4-0x00000000083F0000-0x00000000083F1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2888 phoneactivate.exe 800 dwm.exe 4192 Dxpserver.exe -
Loads dropped DLL 6 IoCs
pid Process 2888 phoneactivate.exe 800 dwm.exe 800 dwm.exe 800 dwm.exe 800 dwm.exe 4192 Dxpserver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ftxdckjforivc = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ADMINI~1\\CPh\\dwm.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA phoneactivate.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dxpserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3228 rundll32.exe 3228 rundll32.exe 3228 rundll32.exe 3228 rundll32.exe 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3444 Process not Found 3444 Process not Found 3444 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3444 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3444 wrote to memory of 1972 3444 Process not Found 96 PID 3444 wrote to memory of 1972 3444 Process not Found 96 PID 3444 wrote to memory of 2888 3444 Process not Found 97 PID 3444 wrote to memory of 2888 3444 Process not Found 97 PID 3444 wrote to memory of 3184 3444 Process not Found 98 PID 3444 wrote to memory of 3184 3444 Process not Found 98 PID 3444 wrote to memory of 800 3444 Process not Found 99 PID 3444 wrote to memory of 800 3444 Process not Found 99 PID 3444 wrote to memory of 1068 3444 Process not Found 100 PID 3444 wrote to memory of 1068 3444 Process not Found 100 PID 3444 wrote to memory of 4192 3444 Process not Found 101 PID 3444 wrote to memory of 4192 3444 Process not Found 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ade4242e8a6dc97b07a8721c32f1e24b_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
C:\Windows\system32\phoneactivate.exeC:\Windows\system32\phoneactivate.exe1⤵PID:1972
-
C:\Users\Admin\AppData\Local\oBN3\phoneactivate.exeC:\Users\Admin\AppData\Local\oBN3\phoneactivate.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2888
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe1⤵PID:3184
-
C:\Users\Admin\AppData\Local\1fA4rQ\dwm.exeC:\Users\Admin\AppData\Local\1fA4rQ\dwm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:800
-
C:\Windows\system32\Dxpserver.exeC:\Windows\system32\Dxpserver.exe1⤵PID:1068
-
C:\Users\Admin\AppData\Local\vNJGNfb\Dxpserver.exeC:\Users\Admin\AppData\Local\vNJGNfb\Dxpserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD55c27608411832c5b39ba04e33d53536c
SHA1f92f8b7439ce1de4c297046ed1d3ff9f20bc97af
SHA2560ac827c9e35cdaa492ddd435079415805dcc276352112b040bcd34ef122cf565
SHA5121fa25eabc08dff9ea25dfa7da310a677927c6344b76815696b0483f8860fa1469820ff15d88a78ed32f712d03003631d9aceaf9c9851de5dd40c1fc2a7bc1309
-
Filesize
1.2MB
MD5cc372b56ec1ae5da7de2a378771380e3
SHA19b67b1cf4cde847269afbc48c7a043a5a3ca2edb
SHA25640256d32b4d25556eb0adea543f99ee4f6b13d636f1a617f151a81e46cd4cab1
SHA512d88011aabb791a11cd587bed21a4b75fe9261caf4d42a79aac178f66a1d677469b9f17deaf59c151c1fff38bc8452aabc1d0f6301ee0671eba05aa1acb5c00a1
-
Filesize
1.4MB
MD5f0664349c8237cd41b94168360314890
SHA135c2bacc0a5c3725cbdbdc7ffc5cf6b1dc41b26a
SHA2565539fe8456012caf9c6993b11b4497157d2d5d8c887a51d62d0c8f81d944714b
SHA5125067683d4fe9201ed40478b1b4fe93721e2b7cdac5b0eb3ed043707c9f1ccd8e26d503d2d02e149401233a8dfdeda98a7ff7aa755be0806505d880eaf82d04ad
-
Filesize
107KB
MD532c31f06e0b68f349f68afdd08e45f3d
SHA1e4b642f887e2c1d76b6b4777ade91e3cb3b9e27c
SHA256cea83eb34233fed5ebeef8745c7c581a8adbefbcfc0e30e2d30a81000c821017
SHA512fe61764b471465b164c9c2202ed349605117d57ceb0eca75acf8bda44e8744c115767ee0caed0b7feb70ba37b477d00805b3fdf0d0fa879dd4c8e3c1dc1c0d26
-
Filesize
310KB
MD56344f1a7d50da5732c960e243c672165
SHA1b6d0236f79d4f988640a8445a5647aff5b5410f7
SHA256b1081651ac33610824e2088ff64d1655993dd3d6073af1e5ffe0b4a0027f502f
SHA51273f6fa01b880e6619fafa065c171bd0a2b7b2d908762b5aca15f2b8d856b5501b3884e3566ef9b8032c8cbf9bb15116e60c22fded4656c8857c974cda4213d65
-
Filesize
1.2MB
MD572538662fc59b3fe4339d7ab278fe22a
SHA1170eae2711184c42dd94ea8785c3685fb0b3b4c8
SHA256deb923a9cd9323b615ad6d58fea290d666d9de5e18a35fec1cf8f79af3cd2e0c
SHA5122ee43e65143c79a6a073a463b201d15d45f846a3a89788bd2241802e0acc306b37c50ec7ea57484eca9e8eb9cbde6a4cdb5db732d6463ad089d90e62d087476b
-
Filesize
1KB
MD5de942f30675eda9e1218211f60f6f7db
SHA18ac23dd106de8b0145833f2992cd6af40a07416c
SHA256a343a5b2d9c36b9c8f6d355dff1f94f47bf45e6d29810eafc6a9b145001f053b
SHA51224c38fbb4b89c4f9e35ed938937c26e2e488ba830e9885480c1c1d23c899dc1aaf53da1546018a5ee9dba6cdd35ee0d90fab38df3d1bff9b9f6bd3208bfc83e7