Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 21:09
Static task
static1
Behavioral task
behavioral1
Sample
53bef9ad0b10e6514966aff4a451b382_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
53bef9ad0b10e6514966aff4a451b382_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
53bef9ad0b10e6514966aff4a451b382_JaffaCakes118.dll
-
Size
144KB
-
MD5
53bef9ad0b10e6514966aff4a451b382
-
SHA1
629b9a78068c3151d024714d02580a92a532af28
-
SHA256
e1e590b4b7412dedaaa0ee98b22436f45b8cf3de6341655fcf36857701e6bcc8
-
SHA512
d5109ed81ac890415e4887c070633cc785d36a1ce5c493dab5cb15ed9f543af3ea16649bbad550524426c5bd23782e071f7e78ae0a1f222897c159eb0d1e73c4
-
SSDEEP
3072:cb2SRia1eQDUl7y1+OZLNSYzIuXVu3bCR50bcwmL46L+:cbtRiWwl7yjZLNSHCXSdh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 17 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5B42D7B-B5E1-428E-8973-6BA9DF484221}\ = "Internet Explorer" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5B42D7B-B5E1-428E-8973-6BA9DF484221}\DefaultIcon rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5B42D7B-B5E1-428E-8973-6BA9DF484221}\InProcServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5B42D7B-B5E1-428E-8973-6BA9DF484221}\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\iexplore.exe" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5B42D7B-B5E1-428E-8973-6BA9DF484221} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5B42D7B-B5E1-428E-8973-6BA9DF484221}\Shell rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5B42D7B-B5E1-428E-8973-6BA9DF484221}\InProcServer32\ = "shdocvw.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5B42D7B-B5E1-428E-8973-6BA9DF484221}\InProcServer32\ThreadingModel = "Apartment" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5B42D7B-B5E1-428E-8973-6BA9DF484221}\Shell\Open rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5B42D7B-B5E1-428E-8973-6BA9DF484221}\ShellFolder\Attributes = 00000000 rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5B42D7B-B5E1-428E-8973-6BA9DF484221}\{305ca226-d286-468e-b848-2b2e8e697b74} 2 = "0" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5B42D7B-B5E1-428E-8973-6BA9DF484221}\DefaultIcon\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5B42D7B-B5E1-428E-8973-6BA9DF484221}\Shell\Open\Command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5B42D7B-B5E1-428E-8973-6BA9DF484221}\Shell\Open\Command\ = "C:\\Program Files\\Internet Explorer\\iexplore.exe Http://www.xihao.net/" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5B42D7B-B5E1-428E-8973-6BA9DF484221}\ShellFolder rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2448 2096 rundll32.exe 30 PID 2096 wrote to memory of 2448 2096 rundll32.exe 30 PID 2096 wrote to memory of 2448 2096 rundll32.exe 30 PID 2096 wrote to memory of 2448 2096 rundll32.exe 30 PID 2096 wrote to memory of 2448 2096 rundll32.exe 30 PID 2096 wrote to memory of 2448 2096 rundll32.exe 30 PID 2096 wrote to memory of 2448 2096 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\53bef9ad0b10e6514966aff4a451b382_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\53bef9ad0b10e6514966aff4a451b382_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2448
-