Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 07:22

General

  • Target

    38fab0a2057e4da975bc2384385372f0_JaffaCakes118.dll

  • Size

    1.1MB

  • MD5

    38fab0a2057e4da975bc2384385372f0

  • SHA1

    15ebe61a0012184a80c19cdf5efa629d4990acbd

  • SHA256

    1de47492b55a1a4160f4d3de36973d57022c0d8ef2b1245653faec8cb19a5f74

  • SHA512

    d36ce08ba4892edbdde482ea78f54713d4b602a7ad4b451bd49e3b055ec213c240d95c2f7f70eaabb9d8198aed61cec0377a074165555979c99eaacf245fb4c1

  • SSDEEP

    24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs005:SuNZ7Ib8ZBL2/XC

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\38fab0a2057e4da975bc2384385372f0_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\38fab0a2057e4da975bc2384385372f0_JaffaCakes118.dll
      2⤵
      • Server Software Component: Terminal Services DLL
      • System Location Discovery: System Language Discovery
      PID:1296
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k dtcGep -s dticem
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:1912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ea277d4f7f.dll

    Filesize

    126B

    MD5

    ef0189d6a7e748390fdca0b45a803138

    SHA1

    79e406b2b766c86d520dced2fe370b9334190629

    SHA256

    5efdad8615408484c2f14adadfd443b78b363d0ac3ef046a5e5a39fcb6a66752

    SHA512

    29ab58a57e24e8548d20d96553ca1a04b3cb4993bad9080b982b5d85cd88c7d8b458714cee396d45c899f63b937f1890c06cb7496c34a1ac58bd413d7d747a74

  • C:\Windows\SysWOW64\ea277d4f7f.dll

    Filesize

    114B

    MD5

    d9addcba5e25f9cbabee0d7cd5cb20e2

    SHA1

    01face1f8a52016f1db84cf8f6efb452ec63c0a8

    SHA256

    ae4ea3af251b02d2250f8f6f52277e6eb1d856b386e016714da43b7bcdda5835

    SHA512

    fea99c092425f9fdd09000d028a3dabc5d5c00b39cf5e872cc5c1d2e4eab3c302cb8902e8364c63d7e0c53685230c23062133b2236968b7e1e4fae1992237e1e

  • memory/1912-7-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/1912-21-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB