Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2024, 18:10

General

  • Target

    ff16df632b875f798221b8e973b35d05_JaffaCakes118.dll

  • Size

    129KB

  • MD5

    ff16df632b875f798221b8e973b35d05

  • SHA1

    2f8d5996394eb2e268b3d3a7348d35de9a8d2da2

  • SHA256

    3b568fde29d1ade3d0ec6f2cb9a71fe366daffabbb2f8df87ea3624f70c8b646

  • SHA512

    af853515f2e42e138be98489cd01602960db1a30bb6e32161e5ff8e87576e059abf46a66e3be7a803ade34609edad00d30e367d13156c1bfa7593573aaa6b906

  • SSDEEP

    3072:M0kfnKdJFxKfs+hUAcCprcH6JEgdzsHOL5PFn0wcccccccc:MJKmfs44aVzsH0PFn0wcccccccc

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ff16df632b875f798221b8e973b35d05_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ff16df632b875f798221b8e973b35d05_JaffaCakes118.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3012
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\{78C32E8E-3422-49C1-A175-28CC89820DFA}\2b75.dll",DllGetClassObject secret 30336
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\{78C32E8E-3422-49C1-A175-28CC89820DFA}\2b75.dll

    Filesize

    129KB

    MD5

    ff16df632b875f798221b8e973b35d05

    SHA1

    2f8d5996394eb2e268b3d3a7348d35de9a8d2da2

    SHA256

    3b568fde29d1ade3d0ec6f2cb9a71fe366daffabbb2f8df87ea3624f70c8b646

    SHA512

    af853515f2e42e138be98489cd01602960db1a30bb6e32161e5ff8e87576e059abf46a66e3be7a803ade34609edad00d30e367d13156c1bfa7593573aaa6b906

  • memory/2172-14-0x00000000002F0000-0x00000000003F0000-memory.dmp

    Filesize

    1024KB

  • memory/2172-12-0x0000000074340000-0x000000007436C000-memory.dmp

    Filesize

    176KB

  • memory/2172-16-0x0000000074340000-0x000000007436C000-memory.dmp

    Filesize

    176KB

  • memory/2172-17-0x00000000002F0000-0x00000000003F0000-memory.dmp

    Filesize

    1024KB

  • memory/2172-21-0x0000000074340000-0x000000007436C000-memory.dmp

    Filesize

    176KB

  • memory/3012-0-0x00000000003F0000-0x00000000004F0000-memory.dmp

    Filesize

    1024KB

  • memory/3012-2-0x00000000751F0000-0x000000007521C000-memory.dmp

    Filesize

    176KB

  • memory/3012-3-0x00000000751F0000-0x000000007521C000-memory.dmp

    Filesize

    176KB

  • memory/3012-4-0x00000000003F0000-0x00000000004F0000-memory.dmp

    Filesize

    1024KB

  • memory/3012-15-0x00000000751F0000-0x000000007521C000-memory.dmp

    Filesize

    176KB