Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
f9df718f7508506e9ebdda7a2ea5dd5c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9df718f7508506e9ebdda7a2ea5dd5c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f9df718f7508506e9ebdda7a2ea5dd5c_JaffaCakes118.dll
-
Size
386KB
-
MD5
f9df718f7508506e9ebdda7a2ea5dd5c
-
SHA1
6a17c548ba8487e340d67dccb95b4b185cd470bd
-
SHA256
8ad40127b256406070ebc5effac5186590b890d8cc79d1a923f0dd3c701b0490
-
SHA512
1c2f1ba6973c2cf589e27ed0b1de18f3cfe1dedea681ea667ac71b351a4ee29c78395f3826341b67ce983f8c16838c7bc8f02fa402fa0cc0077aa7bf1e947421
-
SSDEEP
6144:cZKxNfFKd8zaxQaEyoIXNxeoSnrBH83BAUxwotPkJSGHILCSNiUl:BfYd8z1a0oeoclH8VKJ/HIm/a
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Users\\Admin\\AppData\\Roaming\\isass.exe \"" reg.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2860 reg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2928 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2928 rundll32.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2928 2716 rundll32.exe 29 PID 2716 wrote to memory of 2928 2716 rundll32.exe 29 PID 2716 wrote to memory of 2928 2716 rundll32.exe 29 PID 2716 wrote to memory of 2928 2716 rundll32.exe 29 PID 2716 wrote to memory of 2928 2716 rundll32.exe 29 PID 2716 wrote to memory of 2928 2716 rundll32.exe 29 PID 2716 wrote to memory of 2928 2716 rundll32.exe 29 PID 2928 wrote to memory of 2332 2928 rundll32.exe 30 PID 2928 wrote to memory of 2332 2928 rundll32.exe 30 PID 2928 wrote to memory of 2332 2928 rundll32.exe 30 PID 2928 wrote to memory of 2332 2928 rundll32.exe 30 PID 2928 wrote to memory of 2332 2928 rundll32.exe 30 PID 2928 wrote to memory of 2332 2928 rundll32.exe 30 PID 2928 wrote to memory of 2332 2928 rundll32.exe 30 PID 2332 wrote to memory of 2784 2332 cmd.exe 32 PID 2332 wrote to memory of 2784 2332 cmd.exe 32 PID 2332 wrote to memory of 2784 2332 cmd.exe 32 PID 2332 wrote to memory of 2784 2332 cmd.exe 32 PID 2784 wrote to memory of 2860 2784 cmd.exe 33 PID 2784 wrote to memory of 2860 2784 cmd.exe 33 PID 2784 wrote to memory of 2860 2784 cmd.exe 33 PID 2784 wrote to memory of 2860 2784 cmd.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f9df718f7508506e9ebdda7a2ea5dd5c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f9df718f7508506e9ebdda7a2ea5dd5c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\cmd.execmd /c setup.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V lsass /D "\"C:\Users\Admin\AppData\Roaming\isass.exe \"" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V lsass /D "\"C:\Users\Admin\AppData\Roaming\isass.exe \"" /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2860
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD509b39ac5213820d74ff5b2e309021086
SHA1cbc786e7c806db7f6e9bd02fdf18cb7c98ca512e
SHA2564ebe83a1fe4896fd9481fe8d003e3436fb58410b3016c9dd715c57348c981b2d
SHA512c30d5165f3c21a31a37b128e499f788265d64227b94107d95ae1f0fdc737db143e5094cf75dda13cbedbab8e06a88e5d9ecae04fc134f39350a4e0efe860a44f