Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
bd5493a5247ece47078d029d7f5cb165_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bd5493a5247ece47078d029d7f5cb165_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bd5493a5247ece47078d029d7f5cb165_JaffaCakes118.dll
-
Size
58KB
-
MD5
bd5493a5247ece47078d029d7f5cb165
-
SHA1
fbf141577bfd64e2408aaa0cc90a6447d6aa4ab9
-
SHA256
27c5c70788728be57102613cda8af09969171a4d0fbe5eef81749ef3dc557ebb
-
SHA512
c46ac4aa31c46032a95be351c8b5238e4b5f93d50559ed80fff190f0180c6ef73fc930c8f82c37facad73e80ad91725c1321663129e8db10e85b6dd01db3628b
-
SSDEEP
1536:H+/EkhRwFw5QrNZC0DPmrAbG2TLMk7O/JoZ/tkzGbjk6d2:gtDJQBKMLMOQoZlkSB
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System Piograph = "RunDll32 \"C:\\Windows\\system32\\en\\svcperf.dll\",Init" rundll32.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\en\svcperf.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\en\svcperf.dll rundll32.exe File created C:\Windows\SysWOW64\downlevel\etsrvms.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\downlevel\etsrvms.dll rundll32.exe File created C:\Windows\SysWOW64\Nui\logsrvup.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\Nui\logsrvup.dll rundll32.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 2 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh rundll32.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RunDll32.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter rundll32.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 rundll32.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController rundll32.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral rundll32.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0 rundll32.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral rundll32.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5076 rundll32.exe 5076 rundll32.exe 5076 rundll32.exe 5076 rundll32.exe 5076 rundll32.exe 5076 rundll32.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 4524 wrote to memory of 5076 4524 rundll32.exe 84 PID 4524 wrote to memory of 5076 4524 rundll32.exe 84 PID 4524 wrote to memory of 5076 4524 rundll32.exe 84 PID 5076 wrote to memory of 1408 5076 rundll32.exe 93 PID 5076 wrote to memory of 1408 5076 rundll32.exe 93 PID 5076 wrote to memory of 1408 5076 rundll32.exe 93 PID 5076 wrote to memory of 2428 5076 rundll32.exe 42 PID 5076 wrote to memory of 2428 5076 rundll32.exe 42 PID 5076 wrote to memory of 2472 5076 rundll32.exe 43 PID 5076 wrote to memory of 2472 5076 rundll32.exe 43 PID 5076 wrote to memory of 2556 5076 rundll32.exe 44 PID 5076 wrote to memory of 2556 5076 rundll32.exe 44 PID 5076 wrote to memory of 3332 5076 rundll32.exe 56 PID 5076 wrote to memory of 3332 5076 rundll32.exe 56 PID 5076 wrote to memory of 3620 5076 rundll32.exe 57 PID 5076 wrote to memory of 3620 5076 rundll32.exe 57 PID 5076 wrote to memory of 3828 5076 rundll32.exe 58 PID 5076 wrote to memory of 3828 5076 rundll32.exe 58 PID 5076 wrote to memory of 3928 5076 rundll32.exe 59 PID 5076 wrote to memory of 3928 5076 rundll32.exe 59 PID 5076 wrote to memory of 3992 5076 rundll32.exe 60 PID 5076 wrote to memory of 3992 5076 rundll32.exe 60 PID 5076 wrote to memory of 4080 5076 rundll32.exe 61 PID 5076 wrote to memory of 4080 5076 rundll32.exe 61 PID 5076 wrote to memory of 3648 5076 rundll32.exe 62 PID 5076 wrote to memory of 3648 5076 rundll32.exe 62 PID 5076 wrote to memory of 4468 5076 rundll32.exe 74 PID 5076 wrote to memory of 4468 5076 rundll32.exe 74 PID 5076 wrote to memory of 3312 5076 rundll32.exe 76 PID 5076 wrote to memory of 3312 5076 rundll32.exe 76 PID 5076 wrote to memory of 2940 5076 rundll32.exe 81 PID 5076 wrote to memory of 2940 5076 rundll32.exe 81 PID 5076 wrote to memory of 4524 5076 rundll32.exe 83 PID 5076 wrote to memory of 4524 5076 rundll32.exe 83 PID 5076 wrote to memory of 5072 5076 rundll32.exe 86 PID 5076 wrote to memory of 5072 5076 rundll32.exe 86 PID 5076 wrote to memory of 4868 5076 rundll32.exe 87 PID 5076 wrote to memory of 4868 5076 rundll32.exe 87 PID 5076 wrote to memory of 4220 5076 rundll32.exe 88 PID 5076 wrote to memory of 4220 5076 rundll32.exe 88 PID 5076 wrote to memory of 1408 5076 rundll32.exe 93 PID 5076 wrote to memory of 1408 5076 rundll32.exe 93 PID 5076 wrote to memory of 1664 5076 rundll32.exe 100 PID 5076 wrote to memory of 1664 5076 rundll32.exe 100 PID 5076 wrote to memory of 3000 5076 rundll32.exe 101 PID 5076 wrote to memory of 3000 5076 rundll32.exe 101
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2472
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2556
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3332
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd5493a5247ece47078d029d7f5cb165_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd5493a5247ece47078d029d7f5cb165_JaffaCakes118.dll,#13⤵
- Adds Run key to start application
- Drops file in System32 directory
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\RunDll32.exeRunDll32 "C:\Users\Admin\AppData\Local\Temp\bd5493a5247ece47078d029d7f5cb165_JaffaCakes118.dll",Init4⤵
- System Location Discovery: System Language Discovery
PID:1408
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3620
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3828
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3928
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3992
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4080
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3648
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4468
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3312
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:2940
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:5072
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4868
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:4220
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:1664
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3000
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2AppInit DLLs
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2AppInit DLLs
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5bd5493a5247ece47078d029d7f5cb165
SHA1fbf141577bfd64e2408aaa0cc90a6447d6aa4ab9
SHA25627c5c70788728be57102613cda8af09969171a4d0fbe5eef81749ef3dc557ebb
SHA512c46ac4aa31c46032a95be351c8b5238e4b5f93d50559ed80fff190f0180c6ef73fc930c8f82c37facad73e80ad91725c1321663129e8db10e85b6dd01db3628b