Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 01:12

General

  • Target

    0832c0c85d04226274463b210f2c0c6c_JaffaCakes118.dll

  • Size

    2.0MB

  • MD5

    0832c0c85d04226274463b210f2c0c6c

  • SHA1

    d999989abbbb6a8df30d61afcfdc9efee292d0ca

  • SHA256

    37175ce8db20c813ad2466c36318302a57832598d5896fbf3bfda8d437bc5275

  • SHA512

    f8d5b1ecafa4eecf0b2c95b53ead1157fb9628dcb7515e1a9a6821f247bcc89542f61191d972f0644284a2f1bbf1f08313ce2085fd5352dbd6936322341ecbb8

  • SSDEEP

    12288:NVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:UfP7fWsK5z9A+WGAW+V5SB6Ct4bnb

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0832c0c85d04226274463b210f2c0c6c_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1272
  • C:\Windows\system32\taskmgr.exe
    C:\Windows\system32\taskmgr.exe
    1⤵
      PID:2636
    • C:\Users\Admin\AppData\Local\ZpT\taskmgr.exe
      C:\Users\Admin\AppData\Local\ZpT\taskmgr.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2588
    • C:\Windows\system32\irftp.exe
      C:\Windows\system32\irftp.exe
      1⤵
        PID:1832
      • C:\Users\Admin\AppData\Local\VsqvrK\irftp.exe
        C:\Users\Admin\AppData\Local\VsqvrK\irftp.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2008
      • C:\Windows\system32\calc.exe
        C:\Windows\system32\calc.exe
        1⤵
          PID:1956
        • C:\Users\Admin\AppData\Local\fEKvzia8\calc.exe
          C:\Users\Admin\AppData\Local\fEKvzia8\calc.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1388

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\VsqvrK\WTSAPI32.dll

          Filesize

          2.0MB

          MD5

          d6f7b76694eed05da9359b5e43f21927

          SHA1

          72925a7f88a44b5e53acc52707a9f55b83179440

          SHA256

          37c6574881f9e89f93e2822cd60237d4ea334c7cf527cf183e077e5458ea9116

          SHA512

          7cc2c681a05b2e4a601d0847c5e5612cbae970d34750d1f166e1dd79fabebea348c8ce65624db3fc025d81c7957ddd3144209ac614495727dcd51b24ad199f7f

        • C:\Users\Admin\AppData\Local\ZpT\credui.dll

          Filesize

          2.0MB

          MD5

          ae797708fba6dcf08e42334023b0123f

          SHA1

          bc63768c6ab491ad63e38c48d27b1fd46e30bfea

          SHA256

          108cc4fc4e7a324b7ea04797f7ef61c1167a1b861a9cb26954ffc64ed877f2f8

          SHA512

          52fa35783cdc74fa288c4a10238a9d55d3f2839f4515cdbe2b85f25ce2045729eee80ffa295eb938523bc07df7e40405c307629cffedb15ca25bdf9d41423a0e

        • C:\Users\Admin\AppData\Local\ZpT\taskmgr.exe

          Filesize

          251KB

          MD5

          09f7401d56f2393c6ca534ff0241a590

          SHA1

          e8b4d84a28e5ea17272416ec45726964fdf25883

          SHA256

          6766717b8afafe46b5fd66c7082ccce6b382cbea982c73cb651e35dc8187ace1

          SHA512

          7187a27cd32c1b295c74e36e1b6148a31d602962448b18395a44a721d17daa7271d0cd198edb2ed05ace439746517ffb1bcc11c7f682e09b025c950ea7b83192

        • C:\Users\Admin\AppData\Local\fEKvzia8\VERSION.dll

          Filesize

          2.0MB

          MD5

          e69f2229871e4a28f6622f3466a31f9e

          SHA1

          c9858fdae5d37833adbf0266ba19f8da72dbc494

          SHA256

          15f94339429066cf9209debded8ce7bbdfd4194f091565183e0e16395654f6a8

          SHA512

          986ddf69f82e052b2013426ce767a152646e77eb09fbe094cf5a1f72de75eae58b83a64b86f85ed0454719de6d46f5c16b5f0641b74688cc1b42cf1c5e1d88a8

        • C:\Users\Admin\AppData\Local\fEKvzia8\calc.exe

          Filesize

          897KB

          MD5

          10e4a1d2132ccb5c6759f038cdb6f3c9

          SHA1

          42d36eeb2140441b48287b7cd30b38105986d68f

          SHA256

          c6a91cba00bf87cdb064c49adaac82255cbec6fdd48fd21f9b3b96abf019916b

          SHA512

          9bd44afb164ab3e09a784c765cd03838d2e5f696c549fc233eb5a69cada47a8e1fb62095568cb272a80da579d9d0e124b1c27cf61bb2ac8cf6e584a722d8864d

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ukatmrkmywz.lnk

          Filesize

          1KB

          MD5

          056f6bf430b4c6789427408f014aee00

          SHA1

          7c268f7733bb43feed1ad557bb8b852da045412f

          SHA256

          a5c694da59575dc47938ae2809ef8669c1e572447d89f374e3802c0439843fa1

          SHA512

          4c200c17d4e61d88771ecc76ba7677a61ee53956ae4384e34762c6de6232eec20163b2a9ccbdb8265e8c1225f700a50a11a870bdb8f0e55684db556a96e0ec34

        • \Users\Admin\AppData\Local\VsqvrK\irftp.exe

          Filesize

          192KB

          MD5

          0cae1fb725c56d260bfd6feba7ae9a75

          SHA1

          102ac676a1de3ec3d56401f8efd518c31c8b0b80

          SHA256

          312f4107ff37dc988d99c5f56178708bb74a3906740cff4e337c0dde8f1e151d

          SHA512

          db969064577c4158d6bf925354319766b0d0373ddefb03dbfc9a9d2cadf8ddcd50a7f99b7ddf2ffad5e7fdbb6f02090b5b678bdf792d265054bff3b56ee0b8ec

        • memory/1196-33-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-19-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-48-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-66-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-63-0x0000000077B50000-0x0000000077B52000-memory.dmp

          Filesize

          8KB

        • memory/1196-62-0x00000000779F1000-0x00000000779F2000-memory.dmp

          Filesize

          4KB

        • memory/1196-61-0x0000000002DB0000-0x0000000002DB7000-memory.dmp

          Filesize

          28KB

        • memory/1196-53-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-52-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-51-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-50-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-49-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-47-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-46-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-45-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-44-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-43-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-41-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-28-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-39-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-38-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-37-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-35-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-34-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-60-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-4-0x00000000778E6000-0x00000000778E7000-memory.dmp

          Filesize

          4KB

        • memory/1196-32-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-31-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-10-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-30-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-40-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-27-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-26-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-25-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-24-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-23-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-22-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-20-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-29-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-18-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-17-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-16-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-15-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-14-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-13-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-12-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-42-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-36-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-9-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-8-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-5-0x0000000002DD0000-0x0000000002DD1000-memory.dmp

          Filesize

          4KB

        • memory/1196-136-0x00000000778E6000-0x00000000778E7000-memory.dmp

          Filesize

          4KB

        • memory/1196-7-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1196-21-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1272-11-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1272-1-0x0000000140000000-0x0000000140207000-memory.dmp

          Filesize

          2.0MB

        • memory/1272-0-0x0000000000190000-0x0000000000197000-memory.dmp

          Filesize

          28KB

        • memory/2008-104-0x0000000000240000-0x0000000000247000-memory.dmp

          Filesize

          28KB