Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2024, 05:28
Static task
static1
Behavioral task
behavioral1
Sample
65a62742a787e492b028d52bdb05e703_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
65a62742a787e492b028d52bdb05e703_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
65a62742a787e492b028d52bdb05e703
-
SHA1
f2b8cf85e293861d8cb1cd943909c96e528781e6
-
SHA256
60bd90f888794eb99bba351ecab0e7c63e74bc5a05ffa87404e0f60912fbf384
-
SHA512
e3bc49d29f577273ca331cd1f4325de3edda00bef6fe0a999534b7ddda3d548a683bdb2a4f5e8a5ab4ceb13520a7183d5b03f04bf775206896d7d74bceb5504c
-
SSDEEP
12288:ydMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0Tkr:EMIJxSDX3bqjhcfHk7MzH6zQr
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3396-3-0x00000000027A0000-0x00000000027A1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/4868-1-0x0000000140000000-0x0000000140112000-memory.dmp dridex_payload behavioral2/memory/3396-56-0x0000000140000000-0x0000000140112000-memory.dmp dridex_payload behavioral2/memory/3396-45-0x0000000140000000-0x0000000140112000-memory.dmp dridex_payload behavioral2/memory/4868-59-0x0000000140000000-0x0000000140112000-memory.dmp dridex_payload behavioral2/memory/3988-68-0x0000000140000000-0x0000000140113000-memory.dmp dridex_payload behavioral2/memory/3988-72-0x0000000140000000-0x0000000140113000-memory.dmp dridex_payload behavioral2/memory/2824-83-0x0000000140000000-0x0000000140158000-memory.dmp dridex_payload behavioral2/memory/2824-88-0x0000000140000000-0x0000000140158000-memory.dmp dridex_payload behavioral2/memory/4240-104-0x0000000140000000-0x0000000140113000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 3988 dxgiadaptercache.exe 2824 EaseOfAccessDialog.exe 4240 ApplicationFrameHost.exe -
Loads dropped DLL 4 IoCs
pid Process 3988 dxgiadaptercache.exe 3988 dxgiadaptercache.exe 2824 EaseOfAccessDialog.exe 4240 ApplicationFrameHost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mmqwm = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\YHUybL\\EaseOfAccessDialog.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dxgiadaptercache.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EaseOfAccessDialog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ApplicationFrameHost.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4868 regsvr32.exe 4868 regsvr32.exe 4868 regsvr32.exe 4868 regsvr32.exe 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3396 Process not Found 3396 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3396 wrote to memory of 4992 3396 Process not Found 94 PID 3396 wrote to memory of 4992 3396 Process not Found 94 PID 3396 wrote to memory of 3988 3396 Process not Found 95 PID 3396 wrote to memory of 3988 3396 Process not Found 95 PID 3396 wrote to memory of 8 3396 Process not Found 96 PID 3396 wrote to memory of 8 3396 Process not Found 96 PID 3396 wrote to memory of 2824 3396 Process not Found 97 PID 3396 wrote to memory of 2824 3396 Process not Found 97 PID 3396 wrote to memory of 3296 3396 Process not Found 98 PID 3396 wrote to memory of 3296 3396 Process not Found 98 PID 3396 wrote to memory of 4240 3396 Process not Found 99 PID 3396 wrote to memory of 4240 3396 Process not Found 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\65a62742a787e492b028d52bdb05e703_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
C:\Windows\system32\dxgiadaptercache.exeC:\Windows\system32\dxgiadaptercache.exe1⤵PID:4992
-
C:\Users\Admin\AppData\Local\SBa3\dxgiadaptercache.exeC:\Users\Admin\AppData\Local\SBa3\dxgiadaptercache.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3988
-
C:\Windows\system32\EaseOfAccessDialog.exeC:\Windows\system32\EaseOfAccessDialog.exe1⤵PID:8
-
C:\Users\Admin\AppData\Local\cpvlgfDnH\EaseOfAccessDialog.exeC:\Users\Admin\AppData\Local\cpvlgfDnH\EaseOfAccessDialog.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2824
-
C:\Windows\system32\ApplicationFrameHost.exeC:\Windows\system32\ApplicationFrameHost.exe1⤵PID:3296
-
C:\Users\Admin\AppData\Local\tdySK4BK\ApplicationFrameHost.exeC:\Users\Admin\AppData\Local\tdySK4BK\ApplicationFrameHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5933499acbf2e15349e741b9e29744a92
SHA197f0e5032655c3fd97f180a6df1ec875e6cd3f7c
SHA2567b26844c3bf898c9e76d1c84d6e90b2d96f2e11ceb2490db71c3a5c335df515c
SHA5127e439bb1c3d86a4cdb13bd3c6aa44ed4e247129fdfe25cd01ae881007d7c276f636afc9795e4a103c4f0e1d0842c33387a2c63f802dc88978b20a9e9eff77517
-
Filesize
230KB
MD5e62f89130b7253f7780a862ed9aff294
SHA1b031e64a36e93f95f2061be5b0383069efac2070
SHA2564bea9f741fe4ca9d6262477849896b9fa6377326d11af044561c31bde2d994b5
SHA51205649d38a0b5d825bb8442549427b0ff77b139c9dd297b04d6c0fb1415504c95ed750cd79efea2ff514abfc5d1003e6251a3cd871d352dcea06be0cdeb0304f7
-
Filesize
1.3MB
MD5f6b156d85ccaf74affdba5751f192870
SHA1f2b9218e147d6183c078e74b6fb0a3a1147495b1
SHA2568b61fe852a7a70bc87709bedb00fde4e0a5e99941ed59c107313bfd98c028d97
SHA5120b8c80a904d585eb60b314b3724d641fc79f65191fec9f2ad5fbb7b20dda85a4abe99c30e46b0ea121ae7be37c85d8232718815dc4b38b8b8da6cab732334f9f
-
Filesize
123KB
MD5e75ee992c1041341f709a517c8723c87
SHA1471021260055eac0021f0abffa2d0ba77a2f380e
SHA2560b1731562413eaa972b373cd7388c644a3059940ce67eb89668e4073f3e068dc
SHA51248c3a8531df6bcc5077367cdf32af104c94cf7701118a85e8beabba2e9c4f511ae14e47b6d1b57d11a2bc1e8b4f6d5bacae27a8d16fcd09a8f9e0018f5a6370a
-
Filesize
76KB
MD5d58a8a987a8dafad9dc32a548cc061e7
SHA1f79fc9e0ab066cad530b949c2153c532a5223156
SHA256cf58e424b86775e6f2354291052126a646f842fff811b730714dfbbd8ebc71a4
SHA51293df28b65af23a5f82124ba644e821614e2e2074c98dbb2bd7319d1dfe9e2179b9d660d7720913c79a8e7b2f8560440789ad5e170b9d94670589885060c14265
-
Filesize
1.1MB
MD52fa1812b4badfbe934a745a92c356956
SHA16e4b3fe118730067e45e6afbb073442496e58a47
SHA256cbce7a8f7f246dc59e2c2725874421daf723d8082522fba79e73b01783c557c5
SHA5128a5ec0e3ad711f10339f246b0ab53e7929a22cae19cb059de05da43cbc595e498707e075d863ccc64d059486dea65f42a9107e557240be5510412410ce8bab25
-
Filesize
1KB
MD5fc29fe1fd8e2a751466e212be13ac2cd
SHA1349c1ae92fafe8b45e6bf0cae246f7a3c03eafa6
SHA25640ffc657a857b2677a6b3dfca948670427543075523799b0f784a1488037e66f
SHA51200854666fbb577158801aae8e23d3849514be49e6db2780f6cb710a9fa5d3ce550816f6e0475b3c07701095db407db42212ed82a2a3a0c357be9193bb307fb16