Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 07:22
Static task
static1
Behavioral task
behavioral1
Sample
38fab0a2057e4da975bc2384385372f0_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
38fab0a2057e4da975bc2384385372f0_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
38fab0a2057e4da975bc2384385372f0_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
38fab0a2057e4da975bc2384385372f0
-
SHA1
15ebe61a0012184a80c19cdf5efa629d4990acbd
-
SHA256
1de47492b55a1a4160f4d3de36973d57022c0d8ef2b1245653faec8cb19a5f74
-
SHA512
d36ce08ba4892edbdde482ea78f54713d4b602a7ad4b451bd49e3b055ec213c240d95c2f7f70eaabb9d8198aed61cec0377a074165555979c99eaacf245fb4c1
-
SSDEEP
24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs005:SuNZ7Ib8ZBL2/XC
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\dticem\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\38fab0a2057e4da975bc2384385372f0_JaffaCakes118.dll" regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ea277d4f7f.dll svchost.exe File opened for modification C:\Windows\SysWOW64\ea277d4f7f.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1296 2168 regsvr32.exe 83 PID 2168 wrote to memory of 1296 2168 regsvr32.exe 83 PID 2168 wrote to memory of 1296 2168 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\38fab0a2057e4da975bc2384385372f0_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\38fab0a2057e4da975bc2384385372f0_JaffaCakes118.dll2⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
PID:1296
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k dtcGep -s dticem1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126B
MD5ef0189d6a7e748390fdca0b45a803138
SHA179e406b2b766c86d520dced2fe370b9334190629
SHA2565efdad8615408484c2f14adadfd443b78b363d0ac3ef046a5e5a39fcb6a66752
SHA51229ab58a57e24e8548d20d96553ca1a04b3cb4993bad9080b982b5d85cd88c7d8b458714cee396d45c899f63b937f1890c06cb7496c34a1ac58bd413d7d747a74
-
Filesize
114B
MD5d9addcba5e25f9cbabee0d7cd5cb20e2
SHA101face1f8a52016f1db84cf8f6efb452ec63c0a8
SHA256ae4ea3af251b02d2250f8f6f52277e6eb1d856b386e016714da43b7bcdda5835
SHA512fea99c092425f9fdd09000d028a3dabc5d5c00b39cf5e872cc5c1d2e4eab3c302cb8902e8364c63d7e0c53685230c23062133b2236968b7e1e4fae1992237e1e