Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 02:46

General

  • Target

    0880db875d3faf856245d738b7e0a25a_JaffaCakes118.dll

  • Size

    2.4MB

  • MD5

    0880db875d3faf856245d738b7e0a25a

  • SHA1

    38d0242a90bdc46d7cf3bf3a1b5e0013c23ba0a1

  • SHA256

    cb658c7c3861a3dd49828120e24c44096aef25e1bc1d14a8617d59a281f29fed

  • SHA512

    8696984083fcbe4426976bcb9d6793f6d8653572f747e5095c5413a4ea60a985d54c6fc421a6622d0e3a66b1c4df8069aafc39f2ab88c0aecfbe9f4fed1a56e1

  • SSDEEP

    12288:yQVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1AZ:ufP7fWsK5z9A+WGAW+V5SB6Ct4bnb

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0880db875d3faf856245d738b7e0a25a_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2000
  • C:\Windows\system32\dialer.exe
    C:\Windows\system32\dialer.exe
    1⤵
      PID:2672
    • C:\Users\Admin\AppData\Local\kdb\dialer.exe
      C:\Users\Admin\AppData\Local\kdb\dialer.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2332
    • C:\Windows\system32\SystemPropertiesPerformance.exe
      C:\Windows\system32\SystemPropertiesPerformance.exe
      1⤵
        PID:2948
      • C:\Users\Admin\AppData\Local\k8vCJbZ\SystemPropertiesPerformance.exe
        C:\Users\Admin\AppData\Local\k8vCJbZ\SystemPropertiesPerformance.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2688
      • C:\Windows\system32\slui.exe
        C:\Windows\system32\slui.exe
        1⤵
          PID:2424
        • C:\Users\Admin\AppData\Local\PLs\slui.exe
          C:\Users\Admin\AppData\Local\PLs\slui.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1048

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\PLs\slc.dll

          Filesize

          2.4MB

          MD5

          84fc48616257697a654bf50496fe8e41

          SHA1

          097ccc4080552f36fbbb5e7fc4d04a228fafb8ba

          SHA256

          7abfe01618a11f625e38d7da81de56ad1c22035c6a7079cac203e962fe0c72d0

          SHA512

          a311711e9bc227cd0be2acdc624e6ecce2e166f75b168790d4b84cfe117307ea6a7fd6cc4fce87a6e7e03a134bbdbd16ca8da3c935fd1b837814adae042a1c42

        • C:\Users\Admin\AppData\Local\k8vCJbZ\SYSDM.CPL

          Filesize

          2.4MB

          MD5

          0495206b683e8b67c4352819b1f96dab

          SHA1

          8a6fc40dc14f1e23e640d383f362fbff417ef83f

          SHA256

          27defcc7b9834d5e5d318a25c4dadf708435cbe2fc7b05bb4e882718a2db3557

          SHA512

          0d12ae49c1cc77b019fc4524672f9eb9dc177e52bb923b8a7d13bf212a942e02ed11f85ec687b4cd0d235146c6f754c1176be148093266f1b2af913c54358d8c

        • C:\Users\Admin\AppData\Local\k8vCJbZ\SystemPropertiesPerformance.exe

          Filesize

          80KB

          MD5

          870726cdcc241a92785572628b89cc07

          SHA1

          63d47cc4fe9beb75862add1abca1d8ae8235710a

          SHA256

          1ab77fa1ee0cbe59ca185c228c3c11abeba2b2008a162c91a06d3c40542e7fc6

          SHA512

          89b961c2a2716fe0800e54e0206c8b349a26f1bc2a463ec9bd12f3ab22bfcb13e6402b4c20ddcf284d838a3c66e73335af8f6dc4554d76646382e387242c6f72

        • C:\Users\Admin\AppData\Local\kdb\dialer.exe

          Filesize

          34KB

          MD5

          46523e17ee0f6837746924eda7e9bac9

          SHA1

          d6b2a9cc6bd3588fa9804ada5197afda6a9e034b

          SHA256

          23d8a6a1d847a324c556c30e10c8f63c2004aeb42ac3f5a5ca362077f1517382

          SHA512

          c7117c3778650864e685bd89df599d7cdd9319d757344ddc7cfd9403d6673964127f6ff0c5ac48455fd3097af31a6ff09173f85dfa7be2d25f395cdf3692bb9a

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ygxjfqh.lnk

          Filesize

          1KB

          MD5

          e9aa08760f86787b99d7607c723d0b02

          SHA1

          55c1e85fcbf56ee674928f004b3861ad60964107

          SHA256

          f419283d8cad470ad0cc54c7bd69c64fe32fd49d1ba55216756fa1b4b8572971

          SHA512

          be1c15dee7d95820a7e972607850c663871d35f48cb6d2f802b82f33a29b50339289dc3ae99542f78faae8d0fb9046765b2ec5552a927ff22a5aaf90d84737c8

        • \Users\Admin\AppData\Local\PLs\slui.exe

          Filesize

          341KB

          MD5

          c5ce5ce799387e82b7698a0ee5544a6d

          SHA1

          ed37fdb169bb539271c117d3e8a5f14fd8df1c0d

          SHA256

          34aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c

          SHA512

          79453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c

        • \Users\Admin\AppData\Local\kdb\TAPI32.dll

          Filesize

          2.4MB

          MD5

          db67d75cb55a7b2264966fcfbe83ad9b

          SHA1

          81ced0e1327c6cc823402757a12c8b887e923b6f

          SHA256

          5d3feb82b9ca63c999b476a4a6ec7562312ccd7abea4a8a7143b825e9ce48d76

          SHA512

          c7c418513a569b87ed4257f4b26148e0a78ebbdb419c03b392c5aef74d7300a1135ea250ccb7c47620c72d997897958846bb2473f4a3d3433948b58f77fdfea2

        • memory/1048-145-0x00000000001A0000-0x00000000001A7000-memory.dmp

          Filesize

          28KB

        • memory/1272-48-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-41-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-43-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-54-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-12-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-59-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-71-0x0000000002A80000-0x0000000002A87000-memory.dmp

          Filesize

          28KB

        • memory/1272-63-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-62-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-61-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-60-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-58-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-57-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-56-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-55-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-53-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-52-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-51-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-50-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-73-0x0000000077A10000-0x0000000077A12000-memory.dmp

          Filesize

          8KB

        • memory/1272-72-0x00000000778B1000-0x00000000778B2000-memory.dmp

          Filesize

          4KB

        • memory/1272-5-0x0000000002CE0000-0x0000000002CE1000-memory.dmp

          Filesize

          4KB

        • memory/1272-160-0x00000000776A6000-0x00000000776A7000-memory.dmp

          Filesize

          4KB

        • memory/1272-7-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-15-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-35-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-10-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-49-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-4-0x00000000776A6000-0x00000000776A7000-memory.dmp

          Filesize

          4KB

        • memory/1272-46-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-45-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-44-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-11-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-47-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-36-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-21-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-30-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-40-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-39-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-38-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-37-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-42-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-34-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-33-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-32-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-31-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-29-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-28-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-27-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-26-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-25-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-24-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-23-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-22-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-20-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-19-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-18-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-17-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-16-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-14-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-13-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/1272-8-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/2000-9-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/2000-3-0x0000000000290000-0x0000000000297000-memory.dmp

          Filesize

          28KB

        • memory/2000-0-0x0000000140000000-0x0000000140264000-memory.dmp

          Filesize

          2.4MB

        • memory/2332-104-0x0000000000100000-0x0000000000107000-memory.dmp

          Filesize

          28KB