Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
e2a695764004615ce95eb2405f1e36b8_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e2a695764004615ce95eb2405f1e36b8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e2a695764004615ce95eb2405f1e36b8_JaffaCakes118.dll
-
Size
50KB
-
MD5
e2a695764004615ce95eb2405f1e36b8
-
SHA1
3e3e19180adb273f882ef700feb870075524055e
-
SHA256
89f652cf7ffbd3698f4f7ede5a53c638868706d24d3367a1a18f1b3e3806ad18
-
SHA512
d57819978f592ec5e86442ae8c2c6af4d92bf5f6f5220ecde79c06e44cc9f8b55b575bc319be483ccd3e64142076877539d167188d7f95b20a3afed4909cac25
-
SSDEEP
768:rmYhFpv5qL2K33/gXZlgQprcQEoM1xOPmazukZNNX9BM99OeQOH+mjhtoLvtQLyM:rj7Fv8iCQ2dl1Ezuz9OetfhtoJaPCe
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request 4 IoCs
flow pid Process 20 3524 rundll32.exe 21 3524 rundll32.exe 22 3524 rundll32.exe 23 3524 rundll32.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\e2a695764004615ce95eb2405f1e36b8_JaffaCakes118\parameters\servicedll = "\\\\?\\globalroot\\Device\\HarddiskVolume2\\Users\\Admin\\AppData\\Local\\Temp\\e2a695764004615ce95eb2405f1e36b8_JaffaCakes118.dll" rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\e2a695764004615ce95eb2405f1e36b8_JaffaCakes118\imagepath = "%systemroot%\\system32\\svchost.exe -k netsvcs" rundll32.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\control\safeboot\minimal\e2a695764004615ce95eb2405f1e36b8_JaffaCakes118 rundll32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\e2a695764004615ce95eb2405f1e36b8_JaffaCakes118\ = "service" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3524 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4888 wrote to memory of 3524 4888 rundll32.exe 82 PID 4888 wrote to memory of 3524 4888 rundll32.exe 82 PID 4888 wrote to memory of 3524 4888 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2a695764004615ce95eb2405f1e36b8_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2a695764004615ce95eb2405f1e36b8_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Server Software Component: Terminal Services DLL
- Sets service image path in registry
- Impair Defenses: Safe Mode Boot
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:3524
-