Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
b1c6cbba37f1b127e3147c92b20be349_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b1c6cbba37f1b127e3147c92b20be349_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b1c6cbba37f1b127e3147c92b20be349_JaffaCakes118.dll
-
Size
34KB
-
MD5
b1c6cbba37f1b127e3147c92b20be349
-
SHA1
5b7c22588e5381c641778e28c7e6501c1b77bb60
-
SHA256
9e6d4c5917ad96f81d173a8f04d00c769448e9fd6d8ed101272f27f4d0916dde
-
SHA512
50c39c6ecaee07592153ad8254397af43c52fe2184dd5d962511e622f07ce71e542f6a15d73c9656e4ec75439f003307e87f136546eebfb9d7784fae1636638d
-
SSDEEP
768:U4036VivbIqUWgvJfD6CTFTO0CLqpSLFJpv+OkOiT:B0qbqsJfD6CTFTMaSLFrhxM
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 30 4440 rundll32.exe 35 4440 rundll32.exe -
Loads dropped DLL 3 IoCs
pid Process 3116 rundll32.exe 3116 rundll32.exe 4440 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSServer = "rundll32.exe C:\\Windows\\system32\\cbXQiFya.dll,#1" rundll32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\cbXQiFya.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\cbXQiFya.dll rundll32.exe File created C:\Windows\SysWOW64\hgGabCVm.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C}\InprocServer32\ = "C:\\Windows\\SysWow64\\cbXQiFya.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C}\InprocServer32\ThreadingModel = "Both" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C} rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3116 rundll32.exe 3116 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe 4440 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3116 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3116 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3116 rundll32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5024 wrote to memory of 3116 5024 rundll32.exe 84 PID 5024 wrote to memory of 3116 5024 rundll32.exe 84 PID 5024 wrote to memory of 3116 5024 rundll32.exe 84 PID 3116 wrote to memory of 612 3116 rundll32.exe 5 PID 3116 wrote to memory of 4440 3116 rundll32.exe 96 PID 3116 wrote to memory of 4440 3116 rundll32.exe 96 PID 3116 wrote to memory of 4440 3116 rundll32.exe 96 PID 4440 wrote to memory of 1496 4440 rundll32.exe 97 PID 4440 wrote to memory of 1496 4440 rundll32.exe 97 PID 4440 wrote to memory of 1496 4440 rundll32.exe 97
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b1c6cbba37f1b127e3147c92b20be349_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b1c6cbba37f1b127e3147c92b20be349_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\cbXQiFya.dll,a3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\system32\hgGabCVm.dll",s4⤵
- System Location Discovery: System Language Discovery
PID:1496
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5b1c6cbba37f1b127e3147c92b20be349
SHA15b7c22588e5381c641778e28c7e6501c1b77bb60
SHA2569e6d4c5917ad96f81d173a8f04d00c769448e9fd6d8ed101272f27f4d0916dde
SHA51250c39c6ecaee07592153ad8254397af43c52fe2184dd5d962511e622f07ce71e542f6a15d73c9656e4ec75439f003307e87f136546eebfb9d7784fae1636638d
-
Filesize
1KB
MD55bf8db7f672cae1cb98172a66a77e26b
SHA1cee87c2ca14f279c53268da18fc2458e3f4969c8
SHA256d34e000efe5dbb32fd10751add1f4804f92410450c584c7e6262ac900c708744
SHA5124502ce66cece993b58f77acdc66407586bb3deb827cd50ff8784e0bc340f5e56b1e7554ae46b940df163186124a3c79ce4c9e97f5f9a25842ce0c498ccb03a75