Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
044ab8e914d63a8d58b19b1298f029b2_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
044ab8e914d63a8d58b19b1298f029b2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
044ab8e914d63a8d58b19b1298f029b2_JaffaCakes118.dll
-
Size
159KB
-
MD5
044ab8e914d63a8d58b19b1298f029b2
-
SHA1
3b76c72811530080aba015179f63c3d2297af88d
-
SHA256
6a79c744d175b81495780bd4b0a8d3dd010504e059080dbb522f96f2ab9daf9e
-
SHA512
30da5d808e07f427ecf696ce106906854c78549082d2160c7e4b75b32d8d9115647b12dc0a8428948ed9cd26f1712c457a32143a70087a746bab264a107f450e
-
SSDEEP
3072:W/a5C1c7pLxRtnQjrT6cyzCe9k3nQCpYBGNnI5uICD3F308RcgOmfo6LmuY:WCc1c7ZtQ2pCegZpUsT3R08igOyo6VY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39F498AF-1A09-4275-B193-673B0BA3D478}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\044ab8e914d63a8d58b19b1298f029b2_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5FB6957-65E6-491B-BB37-B25C9FE3BEA7} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5FB6957-65E6-491B-BB37-B25C9FE3BEA7}\ = "CMpeg2DecPropertyPage" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39F498AF-1A09-4275-B193-673B0BA3D478} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5FB6957-65E6-491B-BB37-B25C9FE3BEA7}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{39F498AF-1A09-4275-B193-673B0BA3D478} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{39F498AF-1A09-4275-B193-673B0BA3D478}\CLSID = "{39F498AF-1A09-4275-B193-673B0BA3D478}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39F498AF-1A09-4275-B193-673B0BA3D478}\ = "MPV Decoder Filter" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39F498AF-1A09-4275-B193-673B0BA3D478}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{39F498AF-1A09-4275-B193-673B0BA3D478}\FriendlyName = "MPV Decoder Filter" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39F498AF-1A09-4275-B193-673B0BA3D478}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5FB6957-65E6-491B-BB37-B25C9FE3BEA7}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5FB6957-65E6-491B-BB37-B25C9FE3BEA7}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\044ab8e914d63a8d58b19b1298f029b2_JaffaCakes118.dll" regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{39F498AF-1A09-4275-B193-673B0BA3D478}\FilterData = 020000000200004002000000000000003070693300000000000000000600000000000000000000003074793300000000b0000000c00000003174793300000000d0000000c00000003274793300000000e0000000c00000003374793300000000f0000000c00000003474793300000000f0000000000100003574793300000000f0000000100100003170693308000000000000000100000000000000000000003074793300000000f0000000200100006a910bed4d04d111aa7800c04fc31d6026806de046dbcf11b4d100805f6cbbea133b5236e58ed1118ca30060b057664a20806de046dbcf11b4d100805f6cbbea7669647300001000800000aa00389b7180eb36e44f52ce119f530020af0ba77081eb36e44f52ce119f530020af0ba7704959555600001000800000aa00389b71 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4784 wrote to memory of 544 4784 regsvr32.exe 82 PID 4784 wrote to memory of 544 4784 regsvr32.exe 82 PID 4784 wrote to memory of 544 4784 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\044ab8e914d63a8d58b19b1298f029b2_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\044ab8e914d63a8d58b19b1298f029b2_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:544
-