Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 18:10
Static task
static1
Behavioral task
behavioral1
Sample
ff16df632b875f798221b8e973b35d05_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ff16df632b875f798221b8e973b35d05_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ff16df632b875f798221b8e973b35d05_JaffaCakes118.dll
-
Size
129KB
-
MD5
ff16df632b875f798221b8e973b35d05
-
SHA1
2f8d5996394eb2e268b3d3a7348d35de9a8d2da2
-
SHA256
3b568fde29d1ade3d0ec6f2cb9a71fe366daffabbb2f8df87ea3624f70c8b646
-
SHA512
af853515f2e42e138be98489cd01602960db1a30bb6e32161e5ff8e87576e059abf46a66e3be7a803ade34609edad00d30e367d13156c1bfa7593573aaa6b906
-
SSDEEP
3072:M0kfnKdJFxKfs+hUAcCprcH6JEgdzsHOL5PFn0wcccccccc:MJKmfs44aVzsH0PFn0wcccccccc
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 3012 rundll32.exe 3 2172 rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 2172 rundll32.exe 2172 rundll32.exe 2172 rundll32.exe 2172 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\{78C32E8E-3422-49C1-A175-28CC89820DFA} = "rundll32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\{78C32E8E-3422-49C1-A175-28CC89820DFA}\\2b75.dll\",DllGetClassObject secret 30336" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3012 rundll32.exe 2172 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2372 wrote to memory of 3012 2372 rundll32.exe 30 PID 2372 wrote to memory of 3012 2372 rundll32.exe 30 PID 2372 wrote to memory of 3012 2372 rundll32.exe 30 PID 2372 wrote to memory of 3012 2372 rundll32.exe 30 PID 2372 wrote to memory of 3012 2372 rundll32.exe 30 PID 2372 wrote to memory of 3012 2372 rundll32.exe 30 PID 2372 wrote to memory of 3012 2372 rundll32.exe 30 PID 3012 wrote to memory of 2172 3012 rundll32.exe 32 PID 3012 wrote to memory of 2172 3012 rundll32.exe 32 PID 3012 wrote to memory of 2172 3012 rundll32.exe 32 PID 3012 wrote to memory of 2172 3012 rundll32.exe 32 PID 3012 wrote to memory of 2172 3012 rundll32.exe 32 PID 3012 wrote to memory of 2172 3012 rundll32.exe 32 PID 3012 wrote to memory of 2172 3012 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff16df632b875f798221b8e973b35d05_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff16df632b875f798221b8e973b35d05_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\{78C32E8E-3422-49C1-A175-28CC89820DFA}\2b75.dll",DllGetClassObject secret 303363⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD5ff16df632b875f798221b8e973b35d05
SHA12f8d5996394eb2e268b3d3a7348d35de9a8d2da2
SHA2563b568fde29d1ade3d0ec6f2cb9a71fe366daffabbb2f8df87ea3624f70c8b646
SHA512af853515f2e42e138be98489cd01602960db1a30bb6e32161e5ff8e87576e059abf46a66e3be7a803ade34609edad00d30e367d13156c1bfa7593573aaa6b906