Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
de9f7c5cd040777d55e2ebe34876b98b_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
de9f7c5cd040777d55e2ebe34876b98b_JaffaCakes118.dll
-
Size
912KB
-
MD5
de9f7c5cd040777d55e2ebe34876b98b
-
SHA1
95675e982578ada0df8a02d7347cfb546a81d273
-
SHA256
2ca103eefeb2c579dff1379820596850188eb3a0ca2c08f160a780afedc8c7ba
-
SHA512
cda3f84199ffb78fe86e0c95c64a3e0a5699328ee88f76092706f05baeff117c18671aafd9e7e98191ee22d213ffa9e2bd68db717da5c4522e25909dd461a7ad
-
SSDEEP
24576:6nJhszK5XpnExBM2SN4mreiAXvuxyVAM:6nginExB1niG7
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://shoshanna.at
http://maiamirainy.at
-
build
217027
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Signatures
-
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 208.67.222.222 Destination IP 208.67.222.222 Destination IP 208.67.222.222 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\davhput8 = "rundll32 \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Dmdlsitf\\bitsPQEC.dll\",DllRegisterServer" Explorer.EXE -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2900 set thread context of 2824 2900 rundll32.exe 32 PID 2824 set thread context of 1220 2824 control.exe 21 PID 2824 set thread context of 2532 2824 control.exe 33 PID 1220 set thread context of 1664 1220 Explorer.EXE 39 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2900 rundll32.exe 1220 Explorer.EXE -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2900 rundll32.exe 2824 control.exe 2824 control.exe 1220 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1220 Explorer.EXE -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2900 2612 rundll32.exe 31 PID 2612 wrote to memory of 2900 2612 rundll32.exe 31 PID 2612 wrote to memory of 2900 2612 rundll32.exe 31 PID 2612 wrote to memory of 2900 2612 rundll32.exe 31 PID 2612 wrote to memory of 2900 2612 rundll32.exe 31 PID 2612 wrote to memory of 2900 2612 rundll32.exe 31 PID 2612 wrote to memory of 2900 2612 rundll32.exe 31 PID 2900 wrote to memory of 2824 2900 rundll32.exe 32 PID 2900 wrote to memory of 2824 2900 rundll32.exe 32 PID 2900 wrote to memory of 2824 2900 rundll32.exe 32 PID 2900 wrote to memory of 2824 2900 rundll32.exe 32 PID 2900 wrote to memory of 2824 2900 rundll32.exe 32 PID 2900 wrote to memory of 2824 2900 rundll32.exe 32 PID 2900 wrote to memory of 2824 2900 rundll32.exe 32 PID 2824 wrote to memory of 1220 2824 control.exe 21 PID 2824 wrote to memory of 1220 2824 control.exe 21 PID 2824 wrote to memory of 1220 2824 control.exe 21 PID 2824 wrote to memory of 2532 2824 control.exe 33 PID 2824 wrote to memory of 2532 2824 control.exe 33 PID 2824 wrote to memory of 2532 2824 control.exe 33 PID 2824 wrote to memory of 2532 2824 control.exe 33 PID 2824 wrote to memory of 2532 2824 control.exe 33 PID 2824 wrote to memory of 2532 2824 control.exe 33 PID 1220 wrote to memory of 1672 1220 Explorer.EXE 34 PID 1220 wrote to memory of 1672 1220 Explorer.EXE 34 PID 1220 wrote to memory of 1672 1220 Explorer.EXE 34 PID 1672 wrote to memory of 1680 1672 cmd.exe 36 PID 1672 wrote to memory of 1680 1672 cmd.exe 36 PID 1672 wrote to memory of 1680 1672 cmd.exe 36 PID 1220 wrote to memory of 1940 1220 Explorer.EXE 37 PID 1220 wrote to memory of 1940 1220 Explorer.EXE 37 PID 1220 wrote to memory of 1940 1220 Explorer.EXE 37 PID 1220 wrote to memory of 1664 1220 Explorer.EXE 39 PID 1220 wrote to memory of 1664 1220 Explorer.EXE 39 PID 1220 wrote to memory of 1664 1220 Explorer.EXE 39 PID 1220 wrote to memory of 1664 1220 Explorer.EXE 39 PID 1220 wrote to memory of 1664 1220 Explorer.EXE 39 PID 1220 wrote to memory of 1664 1220 Explorer.EXE 39 PID 1220 wrote to memory of 1664 1220 Explorer.EXE 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de9f7c5cd040777d55e2ebe34876b98b_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de9f7c5cd040777d55e2ebe34876b98b_JaffaCakes118.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\system32\control.exeC:\Windows\system32\control.exe /?4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL /?5⤵PID:2532
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\17E0.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1680
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\17E0.bi1"2⤵PID:1940
-
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵
- System Location Discovery: System Language Discovery
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121B
MD57b2fe0c27ec1d522c221395cf32641bb
SHA1ac777a19d367ac9af9eb6e38505886a043b148fc
SHA2568a3c3702b0c0625896522971c9213977b3ffe5701d83fb589228ddc02bebfc74
SHA5129e3b6cca565acbd20790d4f75217ce421f67477fd9ebf5b79817320a23bb3dd84ab15432f41b599a1fe8d62376bd5f784c622dfb00caf91abb2139fa935bad09
-
Filesize
912KB
MD5de9f7c5cd040777d55e2ebe34876b98b
SHA195675e982578ada0df8a02d7347cfb546a81d273
SHA2562ca103eefeb2c579dff1379820596850188eb3a0ca2c08f160a780afedc8c7ba
SHA512cda3f84199ffb78fe86e0c95c64a3e0a5699328ee88f76092706f05baeff117c18671aafd9e7e98191ee22d213ffa9e2bd68db717da5c4522e25909dd461a7ad