Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 01:21 UTC
Static task
static1
Behavioral task
behavioral1
Sample
f4dcda795d669eadc3e6aece306f5edd_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
f4dcda795d669eadc3e6aece306f5edd_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
f4dcda795d669eadc3e6aece306f5edd
-
SHA1
11264496a75d446d6d6f443d8200caad04340ed9
-
SHA256
1c173d1937e8af89b502f278fb6053f5a1823663ff45e9d9b174483c5d7b46df
-
SHA512
93b7ade0fa90d5f7b0db616d79c498b43aeeb92de6e264c7908124c78f8b57cf5554e26ad36e7c08a36cf6c65207760eb60846c63e215dd3852226aa6d9ba165
-
SSDEEP
24576:luYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9Nipt:f9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1204-5-0x0000000002960000-0x0000000002961000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2632 OptionalFeatures.exe 2920 dpapimig.exe 2108 rdpclip.exe -
Loads dropped DLL 7 IoCs
pid Process 1204 Process not Found 2632 OptionalFeatures.exe 1204 Process not Found 2920 dpapimig.exe 1204 Process not Found 2108 rdpclip.exe 1204 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mcbsdqtxprcnbm = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Ibg3\\dpapimig.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dpapimig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpclip.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OptionalFeatures.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1244 rundll32.exe 1244 rundll32.exe 1244 rundll32.exe 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2068 1204 Process not Found 31 PID 1204 wrote to memory of 2068 1204 Process not Found 31 PID 1204 wrote to memory of 2068 1204 Process not Found 31 PID 1204 wrote to memory of 2632 1204 Process not Found 32 PID 1204 wrote to memory of 2632 1204 Process not Found 32 PID 1204 wrote to memory of 2632 1204 Process not Found 32 PID 1204 wrote to memory of 2212 1204 Process not Found 33 PID 1204 wrote to memory of 2212 1204 Process not Found 33 PID 1204 wrote to memory of 2212 1204 Process not Found 33 PID 1204 wrote to memory of 2920 1204 Process not Found 34 PID 1204 wrote to memory of 2920 1204 Process not Found 34 PID 1204 wrote to memory of 2920 1204 Process not Found 34 PID 1204 wrote to memory of 1476 1204 Process not Found 35 PID 1204 wrote to memory of 1476 1204 Process not Found 35 PID 1204 wrote to memory of 1476 1204 Process not Found 35 PID 1204 wrote to memory of 2108 1204 Process not Found 36 PID 1204 wrote to memory of 2108 1204 Process not Found 36 PID 1204 wrote to memory of 2108 1204 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f4dcda795d669eadc3e6aece306f5edd_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1244
-
C:\Windows\system32\OptionalFeatures.exeC:\Windows\system32\OptionalFeatures.exe1⤵PID:2068
-
C:\Users\Admin\AppData\Local\N1kJMLe\OptionalFeatures.exeC:\Users\Admin\AppData\Local\N1kJMLe\OptionalFeatures.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2632
-
C:\Windows\system32\dpapimig.exeC:\Windows\system32\dpapimig.exe1⤵PID:2212
-
C:\Users\Admin\AppData\Local\uyP\dpapimig.exeC:\Users\Admin\AppData\Local\uyP\dpapimig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2920
-
C:\Windows\system32\rdpclip.exeC:\Windows\system32\rdpclip.exe1⤵PID:1476
-
C:\Users\Admin\AppData\Local\y9tPWsDQ4\rdpclip.exeC:\Users\Admin\AppData\Local\y9tPWsDQ4\rdpclip.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD509b9bc8499ab0cce52d08e83dd0e3537
SHA14aac1a29289a2baf685518d666b000211c00856b
SHA2562d4cc2aed7904d4d0f07d1e9b4c58987e7af27fe1b3f55580cccd25cbc7a6bbd
SHA512f2d1fc42927381e9bc58e3b368092406d5b54d064efe8c4cc270c0d6bf5e914e8eee5f163f87293292afcfb3b62a9ee05b289d461d82fc49a445fb93c6b40b7d
-
Filesize
206KB
MD525d284eb2f12254c001afe9a82575a81
SHA1cf131801fdd5ec92278f9e0ae62050e31c6670a5
SHA256837e0d864c474956c0d9d4e7ae5f884007f19b7f420db9afcf0d266aefa6608b
SHA5127b4f208fa1681a0a139577ebc974e7acfc85e3c906a674e111223783460585eb989cb6b38f215d79f89e747a0e9224d90e1aa43e091d2042edb8bac7b27b968b
-
Filesize
952B
MD5aad769598bbee0370d8ab2fb04927ccb
SHA1eeec49e12616f2258ddc7c802ccd57024852509f
SHA2566e8da17efe5e561867abd696f6b4bd817ce3da3874f7adb0f98cb3c6e37487e8
SHA5120935ba595cd743a48fa4a27625c9a537c30489953831310ce30e7816ab4923bf56e2d6581ba6b1ce278980fbef529d0ec77c33c990d045d6c06aa95713785d9a
-
Filesize
95KB
MD5eae7af6084667c8f05412ddf096167fc
SHA10dbe8aba001447030e48e8ad5466fd23481e6140
SHA25601feebd3aca961f31ba4eac45347b105d1c5772627b08f5538047721b61ff9bc
SHA512172a8accaa35a6c9f86713a330c5899dfeeffe3b43413a3d276fc16d45cd62ed9237aa6bff29cc60a2022fba8dcc156959723c041df4b7463436a3bdabef2a9d
-
Filesize
1.4MB
MD5a41e48f4ffbf50bd3093f23344178014
SHA1d79ec9b2b0f3cde2fcefd97f3ed3dce649c3fc43
SHA25618bde7e65c11b613dd8bb59c9af48085c61fe93ccf06c81e3d0e2941be6a73ba
SHA5126310c05a45ad52184e3edb1f0456dd7c8bc544fd05f5b712c427f278e864cb810d2c6003112ef597cf3aea10ce81e816a5b245a93d297e187cbede115e760d4d
-
Filesize
73KB
MD50e8b8abea4e23ddc9a70614f3f651303
SHA16d332ba4e7a78039f75b211845514ab35ab467b2
SHA25666fc6b68e54b8840a38b4de980cc22aed21009afc1494a9cc68e892329f076a1
SHA5124feded78f9b953472266693e0943030d00f82a5cc8559df60ae0479de281164155e19687afc67cba74d04bb9ad092f5c7732f2d2f9b06274ca2ae87dc2d4a6dc
-
Filesize
1.2MB
MD57bcc923b273d609917761fc6fa255103
SHA1b7f5be00732e90a0592adc5af9aaa49fc6cede3b
SHA2569c7e0877649c62974d6532a0a6ab42ca29be6844b18600d7368314b935a6d7c4
SHA512fa032ac8f3f2d2345c88549eeb3b2c2b63c5e852b0b3862701dd14805a91e1e06eda171989ed45a4792f1bd25171054266dc0f4bc67d20e0f3ce40f2890d78e6