Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
24/03/2025, 04:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_88604ad79ecb7f818bbcceba073e43f9.dll
Resource
win7-20250207-en
General
-
Target
JaffaCakes118_88604ad79ecb7f818bbcceba073e43f9.dll
-
Size
144KB
-
MD5
88604ad79ecb7f818bbcceba073e43f9
-
SHA1
bb3ef6e04606f387829041fd6d20b5d5810504b3
-
SHA256
e05bf49fd4bfeec4f8ea08eba1b62500e778ef47c63fdc156bd193c682a3c126
-
SHA512
9aaa94dacafec669a24e98271c8f687beaeef88cdbcc5e9402fd011ac7caf055a3239b17e5463d2b21a7c9db1badf16e395185da545c4857a5d44e6ba80625c8
-
SSDEEP
3072:aLFyLw4MDuCyfzKqrhtYuEL+sm7dVDGFyPtBD:EbafzoL+PdQyX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2416 regsvr32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 2512 regsvr32.exe 2512 regsvr32.exe 2168 WerFault.exe 2168 WerFault.exe 2168 WerFault.exe 2168 WerFault.exe 2168 WerFault.exe 2168 WerFault.exe 2168 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr32mgr.exe regsvr32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2168 2416 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32mgr.exe -
Modifies registry class 37 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{509C4001-13C5-11D5-8F2A-0080C84E9C39}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_88604ad79ecb7f818bbcceba073e43f9.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{509C4001-13C5-11D5-8F2A-0080C84E9C39}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E972830F-9A57-49D4-90A0-D3D289C71CF2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E972830F-9A57-49D4-90A0-D3D289C71CF2}\ProxyStubClsid32\ = "{509C4001-13C5-11D5-8F2A-0080C84E9C39}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E972830F-9A57-49D4-90A0-D3D289C71CF2}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FC8869C0-D263-49FE-BF43-4682BF7EA183}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{509C4001-13C5-11D5-8F2A-0080C84E9C39} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F4A7B79D-4473-4C4F-8F26-E240BFEDB72A}\ProxyStubClsid32\ = "{509C4001-13C5-11D5-8F2A-0080C84E9C39}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FC8869C0-D263-49FE-BF43-4682BF7EA183}\NumMethods\ = "5" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{66AA0EC6-10E5-494C-AE9B-5541264CE597} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{66AA0EC6-10E5-494C-AE9B-5541264CE597}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F4A7B79D-4473-4C4F-8F26-E240BFEDB72A}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{509C4001-13C5-11D5-8F2A-0080C84E9C39}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{509C4001-13C5-11D5-8F2A-0080C84E9C39}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{509C4001-13C5-11D5-8F2A-0080C84E9C39} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F4A7B79D-4473-4C4F-8F26-E240BFEDB72A} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FC8869C0-D263-49FE-BF43-4682BF7EA183} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FC8869C0-D263-49FE-BF43-4682BF7EA183}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{509C4001-13C5-11D5-8F2A-0080C84E9C39}\NumMethods regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F4A7B79D-4473-4C4F-8F26-E240BFEDB72A}\ = "IVideoSet3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{66AA0EC6-10E5-494C-AE9B-5541264CE597}\ProxyStubClsid32\ = "{509C4001-13C5-11D5-8F2A-0080C84E9C39}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{509C4001-13C5-11D5-8F2A-0080C84E9C39}\ProxyStubClsid32\ = "{509C4001-13C5-11D5-8F2A-0080C84E9C39}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{509C4001-13C5-11D5-8F2A-0080C84E9C39}\ = "IVideoSet" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{509C4001-13C5-11D5-8F2A-0080C84E9C39}\NumMethods\ = "18" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E972830F-9A57-49D4-90A0-D3D289C71CF2}\NumMethods\ = "24" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F4A7B79D-4473-4C4F-8F26-E240BFEDB72A}\NumMethods\ = "33" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{66AA0EC6-10E5-494C-AE9B-5541264CE597}\NumMethods\ = "47" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E972830F-9A57-49D4-90A0-D3D289C71CF2}\ = "IVideoSet2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FC8869C0-D263-49FE-BF43-4682BF7EA183}\ProxyStubClsid32\ = "{509C4001-13C5-11D5-8F2A-0080C84E9C39}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FC8869C0-D263-49FE-BF43-4682BF7EA183}\ = "IDxvaConfig" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{66AA0EC6-10E5-494C-AE9B-5541264CE597}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{66AA0EC6-10E5-494C-AE9B-5541264CE597}\ = "ICLAudProp3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{509C4001-13C5-11D5-8F2A-0080C84E9C39}\ = "PSFactoryBuffer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E972830F-9A57-49D4-90A0-D3D289C71CF2}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F4A7B79D-4473-4C4F-8F26-E240BFEDB72A}\NumMethods regsvr32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2512 2220 regsvr32.exe 30 PID 2220 wrote to memory of 2512 2220 regsvr32.exe 30 PID 2220 wrote to memory of 2512 2220 regsvr32.exe 30 PID 2220 wrote to memory of 2512 2220 regsvr32.exe 30 PID 2220 wrote to memory of 2512 2220 regsvr32.exe 30 PID 2220 wrote to memory of 2512 2220 regsvr32.exe 30 PID 2220 wrote to memory of 2512 2220 regsvr32.exe 30 PID 2512 wrote to memory of 2416 2512 regsvr32.exe 31 PID 2512 wrote to memory of 2416 2512 regsvr32.exe 31 PID 2512 wrote to memory of 2416 2512 regsvr32.exe 31 PID 2512 wrote to memory of 2416 2512 regsvr32.exe 31 PID 2416 wrote to memory of 2168 2416 regsvr32mgr.exe 32 PID 2416 wrote to memory of 2168 2416 regsvr32mgr.exe 32 PID 2416 wrote to memory of 2168 2416 regsvr32mgr.exe 32 PID 2416 wrote to memory of 2168 2416 regsvr32mgr.exe 32
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_88604ad79ecb7f818bbcceba073e43f9.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_88604ad79ecb7f818bbcceba073e43f9.dll2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\regsvr32mgr.exeC:\Windows\SysWOW64\regsvr32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 1524⤵
- Loads dropped DLL
- Program crash
PID:2168
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD5d26092af969610dab56e02649ecae88d
SHA1cd450ff4b645acd188fa1f9e9c16a972c0e99f87
SHA256e4fedb771fd949517cbf3392c9f36be599bf16726a4702cb960a1f4845c39a71
SHA5128c87bf4318089dc03d7c60b1d1f04ac46333f792ca37bd3a0ca832dc22ae56dc8b0a473154706ef58812c70cf99d6fee877ab4984ce973eaaa3e5d1525730b05