Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2024, 17:22

General

  • Target

    3110063a4d08b9c8f873fc641dd9fd8d_JaffaCakes118.exe

  • Size

    65KB

  • MD5

    3110063a4d08b9c8f873fc641dd9fd8d

  • SHA1

    b75ed6a779b8ff34bc00030c886ec01e4081f27c

  • SHA256

    cef4173afc01d70c99818a3a6099a1ebe939ee5b39a3c92b149a659b300e23b4

  • SHA512

    d060e4859c96046e92cbd472d8572d788d222a4b9934f4cc052f658aa936aef4607abff4903014b088df785be1759dbabe172cfb8bf0aade509298865da0eebc

  • SSDEEP

    1536:o4rlcp+YIfbhkuGP5bM6gqC7KnBwvtpcyDxFtwk:o4YI1kuGPcx7sBCoyDzik

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3110063a4d08b9c8f873fc641dd9fd8d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3110063a4d08b9c8f873fc641dd9fd8d_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Windows\SysWOW64\Regsvr32.exe
      Regsvr32.exe /s zolker005.dll
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:2112
    • C:\Windows\SysWOW64\Regsvr32.exe
      Regsvr32.exe /s ztoolb005.dll
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:2452
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\phhr.bat" "C:\Users\Admin\AppData\Local\Temp\3110063a4d08b9c8f873fc641dd9fd8d_JaffaCakes118.exe""
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\phhr.bat

    Filesize

    42B

    MD5

    206dacf9dfb4c6fddb790d7efcc79747

    SHA1

    402e3fa2aa89ce44481535c91a27a8f95714d908

    SHA256

    8c5318e9b16a29ffdb75adfcbd36d9dc9866f9e52d4b8212ad515f477b568bcf

    SHA512

    e6e55368dfd733f8a99a05d8a7bc8c9415fc7a5e6983aa2f43bcbe6cd2713ba58d3b11e2159a61eea0a860301c3a26c6853854f4a474711a328aa0cc273caeb0

  • C:\Windows\SysWOW64\zolker005.dll

    Filesize

    83KB

    MD5

    f57ba4f0951e916a506a4591350a3dc5

    SHA1

    0567396ac10caee9796ecf6d48f70935fc53b992

    SHA256

    b0c8573906b1a3e33c9015fc26c5558de4472509b12bfdd5f2673e21b89de781

    SHA512

    993b4abbdaf30854415a236778de8265d4afd22bd2b155b81e450c2de614de018cb68437845f4ed691eb6a57e04e4e730c8c1283d992bed69d493e298f00fad8

  • C:\Windows\SysWOW64\ztoolb005.dll

    Filesize

    53KB

    MD5

    dfe627ffc6143779e9a95ddd50f950a4

    SHA1

    b6506ec737be683f1218ea1989d8f2718bb0bec7

    SHA256

    8280a3f2ca7d59029efc9170f44bb1716b43f395d0a7baa9901f638b378c9baf

    SHA512

    362ec9ad46376e4ac6e430812ba7cff426747e35b26c9dd03838c5f6334f45f5300574cd773c6f5d196aa2ebbfd9adec9308203918d9e7797301d0f93d9c6702

  • memory/1016-14-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB