Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
de9f7c5cd040777d55e2ebe34876b98b_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
de9f7c5cd040777d55e2ebe34876b98b_JaffaCakes118.dll
-
Size
912KB
-
MD5
de9f7c5cd040777d55e2ebe34876b98b
-
SHA1
95675e982578ada0df8a02d7347cfb546a81d273
-
SHA256
2ca103eefeb2c579dff1379820596850188eb3a0ca2c08f160a780afedc8c7ba
-
SHA512
cda3f84199ffb78fe86e0c95c64a3e0a5699328ee88f76092706f05baeff117c18671aafd9e7e98191ee22d213ffa9e2bd68db717da5c4522e25909dd461a7ad
-
SSDEEP
24576:6nJhszK5XpnExBM2SN4mreiAXvuxyVAM:6nginExB1niG7
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://shoshanna.at
http://maiamirainy.at
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Signatures
-
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 208.67.222.222 Destination IP 208.67.222.222 Destination IP 208.67.222.222 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bcdprAPI = "rundll32 \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Bthpclnt\\DevQupnp.dll\",DllRegisterServer" Explorer.EXE -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 4084 set thread context of 4036 4084 rundll32.exe 94 PID 4036 set thread context of 3440 4036 control.exe 56 PID 3440 set thread context of 4024 3440 Explorer.EXE 60 PID 4036 set thread context of 5084 4036 control.exe 96 PID 3440 set thread context of 432 3440 Explorer.EXE 62 PID 3440 set thread context of 4568 3440 Explorer.EXE 76 PID 3440 set thread context of 4856 3440 Explorer.EXE 85 PID 3440 set thread context of 4836 3440 Explorer.EXE 86 PID 3440 set thread context of 5104 3440 Explorer.EXE 103 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4084 rundll32.exe 4084 rundll32.exe 3440 Explorer.EXE 3440 Explorer.EXE -
Suspicious behavior: MapViewOfSection 9 IoCs
pid Process 4084 rundll32.exe 4036 control.exe 3440 Explorer.EXE 4036 control.exe 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3440 Explorer.EXE Token: SeCreatePagefilePrivilege 3440 Explorer.EXE Token: SeShutdownPrivilege 3440 Explorer.EXE Token: SeCreatePagefilePrivilege 3440 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3440 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3440 Explorer.EXE -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 4532 wrote to memory of 4084 4532 rundll32.exe 83 PID 4532 wrote to memory of 4084 4532 rundll32.exe 83 PID 4532 wrote to memory of 4084 4532 rundll32.exe 83 PID 4084 wrote to memory of 4036 4084 rundll32.exe 94 PID 4084 wrote to memory of 4036 4084 rundll32.exe 94 PID 4084 wrote to memory of 4036 4084 rundll32.exe 94 PID 4084 wrote to memory of 4036 4084 rundll32.exe 94 PID 4084 wrote to memory of 4036 4084 rundll32.exe 94 PID 4036 wrote to memory of 3440 4036 control.exe 56 PID 4036 wrote to memory of 3440 4036 control.exe 56 PID 4036 wrote to memory of 3440 4036 control.exe 56 PID 3440 wrote to memory of 4024 3440 Explorer.EXE 60 PID 4036 wrote to memory of 5084 4036 control.exe 96 PID 4036 wrote to memory of 5084 4036 control.exe 96 PID 4036 wrote to memory of 5084 4036 control.exe 96 PID 3440 wrote to memory of 4024 3440 Explorer.EXE 60 PID 3440 wrote to memory of 4024 3440 Explorer.EXE 60 PID 3440 wrote to memory of 432 3440 Explorer.EXE 62 PID 4036 wrote to memory of 5084 4036 control.exe 96 PID 4036 wrote to memory of 5084 4036 control.exe 96 PID 3440 wrote to memory of 432 3440 Explorer.EXE 62 PID 3440 wrote to memory of 432 3440 Explorer.EXE 62 PID 3440 wrote to memory of 4568 3440 Explorer.EXE 76 PID 3440 wrote to memory of 4568 3440 Explorer.EXE 76 PID 3440 wrote to memory of 4568 3440 Explorer.EXE 76 PID 3440 wrote to memory of 4856 3440 Explorer.EXE 85 PID 3440 wrote to memory of 4856 3440 Explorer.EXE 85 PID 3440 wrote to memory of 4856 3440 Explorer.EXE 85 PID 3440 wrote to memory of 4836 3440 Explorer.EXE 86 PID 3440 wrote to memory of 4836 3440 Explorer.EXE 86 PID 3440 wrote to memory of 4836 3440 Explorer.EXE 86 PID 3440 wrote to memory of 4304 3440 Explorer.EXE 98 PID 3440 wrote to memory of 4304 3440 Explorer.EXE 98 PID 4304 wrote to memory of 244 4304 cmd.exe 100 PID 4304 wrote to memory of 244 4304 cmd.exe 100 PID 3440 wrote to memory of 2204 3440 Explorer.EXE 101 PID 3440 wrote to memory of 2204 3440 Explorer.EXE 101 PID 3440 wrote to memory of 5104 3440 Explorer.EXE 103 PID 3440 wrote to memory of 5104 3440 Explorer.EXE 103 PID 3440 wrote to memory of 5104 3440 Explorer.EXE 103 PID 3440 wrote to memory of 5104 3440 Explorer.EXE 103 PID 3440 wrote to memory of 5104 3440 Explorer.EXE 103 PID 3440 wrote to memory of 5104 3440 Explorer.EXE 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de9f7c5cd040777d55e2ebe34876b98b_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de9f7c5cd040777d55e2ebe34876b98b_JaffaCakes118.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\system32\control.exeC:\Windows\system32\control.exe /?4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL /?5⤵PID:5084
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\5DA0.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:244
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\5DA0.bi1"2⤵PID:2204
-
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵
- System Location Discovery: System Language Discovery
PID:5104
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4024
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:432
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4568
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4856
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121B
MD57b2fe0c27ec1d522c221395cf32641bb
SHA1ac777a19d367ac9af9eb6e38505886a043b148fc
SHA2568a3c3702b0c0625896522971c9213977b3ffe5701d83fb589228ddc02bebfc74
SHA5129e3b6cca565acbd20790d4f75217ce421f67477fd9ebf5b79817320a23bb3dd84ab15432f41b599a1fe8d62376bd5f784c622dfb00caf91abb2139fa935bad09
-
Filesize
912KB
MD5de9f7c5cd040777d55e2ebe34876b98b
SHA195675e982578ada0df8a02d7347cfb546a81d273
SHA2562ca103eefeb2c579dff1379820596850188eb3a0ca2c08f160a780afedc8c7ba
SHA512cda3f84199ffb78fe86e0c95c64a3e0a5699328ee88f76092706f05baeff117c18671aafd9e7e98191ee22d213ffa9e2bd68db717da5c4522e25909dd461a7ad