Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 07:22
Static task
static1
Behavioral task
behavioral1
Sample
38fab0a2057e4da975bc2384385372f0_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
38fab0a2057e4da975bc2384385372f0_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
38fab0a2057e4da975bc2384385372f0_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
38fab0a2057e4da975bc2384385372f0
-
SHA1
15ebe61a0012184a80c19cdf5efa629d4990acbd
-
SHA256
1de47492b55a1a4160f4d3de36973d57022c0d8ef2b1245653faec8cb19a5f74
-
SHA512
d36ce08ba4892edbdde482ea78f54713d4b602a7ad4b451bd49e3b055ec213c240d95c2f7f70eaabb9d8198aed61cec0377a074165555979c99eaacf245fb4c1
-
SSDEEP
24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs005:SuNZ7Ib8ZBL2/XC
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\dticem\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\38fab0a2057e4da975bc2384385372f0_JaffaCakes118.dll" regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ceebaa49bc.dll svchost.exe File opened for modification C:\Windows\SysWOW64\ceebaa49bc.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2324 2200 regsvr32.exe 30 PID 2200 wrote to memory of 2324 2200 regsvr32.exe 30 PID 2200 wrote to memory of 2324 2200 regsvr32.exe 30 PID 2200 wrote to memory of 2324 2200 regsvr32.exe 30 PID 2200 wrote to memory of 2324 2200 regsvr32.exe 30 PID 2200 wrote to memory of 2324 2200 regsvr32.exe 30 PID 2200 wrote to memory of 2324 2200 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\38fab0a2057e4da975bc2384385372f0_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\38fab0a2057e4da975bc2384385372f0_JaffaCakes118.dll2⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
PID:2324
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k dtcGep1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114B
MD552d9b4c0dc77aa71babaf443c7ab950c
SHA159776b7b2870c4166cff2869164a8beb0e6937f2
SHA256d48398120fce58891b6a883458c7b61563cb8eb9a463509ebb55b6ebb937ccbc
SHA5120c4c22d1d35de5c2eee83a2d6fcf4bf968a76cf59b32188725e9823f79fcb9aa9c3f1e3582c318e01eef46ef0cd2a21e07cc9dad46c26cee70ec48d6e6410536