Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
db2a26f6b9be264be5834764341660d0_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db2a26f6b9be264be5834764341660d0_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
db2a26f6b9be264be5834764341660d0_JaffaCakes118.dll
-
Size
56KB
-
MD5
db2a26f6b9be264be5834764341660d0
-
SHA1
66f79380d89b142c6140c17e03d4e318da5c6588
-
SHA256
c56e554b18a841cafbb8bbdf441080052dd7f125350a7e45678dabb0ee9447f5
-
SHA512
c06bc76a964a2ba87f0b9ec8f1c58c61bf3d5bd35e7ef3c108b76a79f622744af65a67d4e55a2d70e8f18838b18da2ed1f5946cc6b217da4fcf0536ccb18049e
-
SSDEEP
1536:uurO+t7zUXu6f99QPeeu4TGa2e0DAwI5p8Eui:uMFzmNVi2sTGKui
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 27 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\NlbMigPlugin.dll regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\NlbMigPlugin.dll\AppID = "{2f4c3d87-2695-40f6-8b48-b7d45d64545f}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{376b9f2d-3ce1-442d-af84-bd77bfff79a6}\InprocServer32\ThreadingModel = "free" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NlbMigPlugin.MigrationPlugin regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NlbMigPlugin.MigrationPlugin\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NlbMigPlugin.MigrationPlugin.1\ = "NlbMigrationPlugin Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NlbMigPlugin.MigrationPlugin.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{376b9f2d-3ce1-442d-af84-bd77bfff79a6} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{376b9f2d-3ce1-442d-af84-bd77bfff79a6}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NlbMigPlugin.MigrationPlugin.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NlbMigPlugin.MigrationPlugin\CLSID\ = "{376b9f2d-3ce1-442d-af84-bd77bfff79a6}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{2f4c3d87-2695-40f6-8b48-b7d45d64545f}\ = "NlbMigPlugin" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NlbMigPlugin.MigrationPlugin\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{376b9f2d-3ce1-442d-af84-bd77bfff79a6}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{2f4c3d87-2695-40f6-8b48-b7d45d64545f} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NlbMigPlugin.MigrationPlugin.1\CLSID\ = "{376b9f2d-3ce1-442d-af84-bd77bfff79a6}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NlbMigPlugin.MigrationPlugin\ = "NlbMigrationPlugin Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NlbMigPlugin.MigrationPlugin\CurVer\ = "NlbMigPlugin.MigrationPlugin.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{376b9f2d-3ce1-442d-af84-bd77bfff79a6}\AppID = "{2f4c3d87-2695-40f6-8b48-b7d45d64545f}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{376b9f2d-3ce1-442d-af84-bd77bfff79a6}\ = "NlbMigrationPlugin Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{376b9f2d-3ce1-442d-af84-bd77bfff79a6}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\db2a26f6b9be264be5834764341660d0_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{376b9f2d-3ce1-442d-af84-bd77bfff79a6}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{376b9f2d-3ce1-442d-af84-bd77bfff79a6}\ProgID\ = "NlbMigPlugin.MigrationPlugin.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{376b9f2d-3ce1-442d-af84-bd77bfff79a6}\VersionIndependentProgID\ = "NlbMigPlugin.MigrationPlugin" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{376b9f2d-3ce1-442d-af84-bd77bfff79a6}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{376b9f2d-3ce1-442d-af84-bd77bfff79a6}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{376b9f2d-3ce1-442d-af84-bd77bfff79a6}\TypeLib\ = "{2F4C3D87-2695-40F6-8B48-B7D45D64545F}" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1140 wrote to memory of 2928 1140 regsvr32.exe 29 PID 1140 wrote to memory of 2928 1140 regsvr32.exe 29 PID 1140 wrote to memory of 2928 1140 regsvr32.exe 29 PID 1140 wrote to memory of 2928 1140 regsvr32.exe 29 PID 1140 wrote to memory of 2928 1140 regsvr32.exe 29 PID 1140 wrote to memory of 2928 1140 regsvr32.exe 29 PID 1140 wrote to memory of 2928 1140 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\db2a26f6b9be264be5834764341660d0_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\db2a26f6b9be264be5834764341660d0_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2928
-