Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01/01/2025, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_50dbecf371132a3a6f5ec7da86de93cf.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_50dbecf371132a3a6f5ec7da86de93cf.dll
-
Size
224KB
-
MD5
50dbecf371132a3a6f5ec7da86de93cf
-
SHA1
e686de64cec0c309140874416165a2838e77055e
-
SHA256
bb67dc5a989bc3ef0db414b2a4e5bb0720e11278401bfded9cbdc774281604f1
-
SHA512
360b4f160ba7a6194ac372f6f21ff3f7a4ecaae6421c801a747990ccc6da95ac64861234896677f0faa2e09ddac098596f1d24373699678d5892c44eb2f436d5
-
SSDEEP
3072:hoxMflFIIWkxuh+BCFFnJX0CZkkuWT/NH22stNB+KcItcTCQ9wNzx9M6VP5KkMsu:hoxMfL0+EHwWTFHJUB+lF9wN9bPNMsqD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1036 regsvr32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 824 regsvr32.exe 824 regsvr32.exe 1564 WerFault.exe 1564 WerFault.exe 1564 WerFault.exe 1564 WerFault.exe 1564 WerFault.exe 1564 WerFault.exe 1564 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr32mgr.exe regsvr32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1564 1036 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{967B2D40-8B7D-4127-9049-61EA0C2C6DCE}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{967B2D40-8B7D-4127-9049-61EA0C2C6DCE} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{967B2D40-8B7D-4127-9049-61EA0C2C6DCE}\ = "PowerISO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{967B2D40-8B7D-4127-9049-61EA0C2C6DCE}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{967B2D40-8B7D-4127-9049-61EA0C2C6DCE}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_50dbecf371132a3a6f5ec7da86de93cf.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\PowerISO regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\PowerISO\ = "{967B2D40-8B7D-4127-9049-61EA0C2C6DCE}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\PowerISO regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\PowerISO\ = "{967B2D40-8B7D-4127-9049-61EA0C2C6DCE}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\PowerISO regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\PowerISO\ = "{967B2D40-8B7D-4127-9049-61EA0C2C6DCE}" regsvr32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2116 wrote to memory of 824 2116 regsvr32.exe 30 PID 2116 wrote to memory of 824 2116 regsvr32.exe 30 PID 2116 wrote to memory of 824 2116 regsvr32.exe 30 PID 2116 wrote to memory of 824 2116 regsvr32.exe 30 PID 2116 wrote to memory of 824 2116 regsvr32.exe 30 PID 2116 wrote to memory of 824 2116 regsvr32.exe 30 PID 2116 wrote to memory of 824 2116 regsvr32.exe 30 PID 824 wrote to memory of 1036 824 regsvr32.exe 31 PID 824 wrote to memory of 1036 824 regsvr32.exe 31 PID 824 wrote to memory of 1036 824 regsvr32.exe 31 PID 824 wrote to memory of 1036 824 regsvr32.exe 31 PID 1036 wrote to memory of 1564 1036 regsvr32mgr.exe 32 PID 1036 wrote to memory of 1564 1036 regsvr32mgr.exe 32 PID 1036 wrote to memory of 1564 1036 regsvr32mgr.exe 32 PID 1036 wrote to memory of 1564 1036 regsvr32mgr.exe 32
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50dbecf371132a3a6f5ec7da86de93cf.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50dbecf371132a3a6f5ec7da86de93cf.dll2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\regsvr32mgr.exeC:\Windows\SysWOW64\regsvr32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 1564⤵
- Loads dropped DLL
- Program crash
PID:1564
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD50e0f0ae845d89c22bb6385f64a6b85fd
SHA10f3f1e7f18ab81572c5ce938d3880d4a5d7100ac
SHA2565a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd
SHA512baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350