Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 02:11

General

  • Target

    086496fb6fe562b586cd3abf1ca6e14a_JaffaCakes118.dll

  • Size

    500KB

  • MD5

    086496fb6fe562b586cd3abf1ca6e14a

  • SHA1

    546392bf66d4bca1fb6a48064e33f98a290c4a4d

  • SHA256

    d6b08e641252b2c1e1d0d00c487a26b569c34bbed5f703f2c421f236e957ce0e

  • SHA512

    e31bea0b290181e0d4c9ff2b785fd5a3e56b38e434c8b27c41ad518edc21275ba377bdecb95508d1d42a155455a5c4f8f18f282226260119d41dc14dcb15218b

  • SSDEEP

    12288:nhxbcg9ZO2sEJAAP9pQbhZG0EsVUg70sq:vbcaZQE59p8Jfug7q

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\086496fb6fe562b586cd3abf1ca6e14a_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\086496fb6fe562b586cd3abf1ca6e14a_JaffaCakes118.dll,#1
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\7e78bc8d45.dl

    Filesize

    34B

    MD5

    3721b1036f2a784f72b52cd47429d3f1

    SHA1

    e547c6335d9eeafc5f1f9e7f4659ff3ef457e833

    SHA256

    bc24de49a27e73fec78ec74ad0796b2c083f0623468d2d6809f3bb0c0ce43930

    SHA512

    c67d6ac77ab960ab31ee6e179d54724901f700236853b381c3b2a7798eb40e0b668efb152676abbd58ea8adcab8eeb9e3364691869cbc1841b19ddf8a190880e

  • memory/2816-0-0x0000000002050000-0x00000000021A3000-memory.dmp

    Filesize

    1.3MB

  • memory/2816-21-0x0000000002050000-0x00000000021A3000-memory.dmp

    Filesize

    1.3MB