Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 20:20

General

  • Target

    f696ead7eba6d5df7a2016b5fd193e9e_JaffaCakes118.exe

  • Size

    792KB

  • MD5

    f696ead7eba6d5df7a2016b5fd193e9e

  • SHA1

    3cf4cf17c5c2347721570f1df0d710133fb65413

  • SHA256

    d1503ceac0fde6e0979d6ba3f6fba34ebdc3fb4ca5f785757e8ef45383b9273d

  • SHA512

    1013c7405fca15e1c8759ff049de21cfa85aeb3ba15294690b396b6fb165648d10868efc86b9c84a458617a5444c769e2ca86cc600de58b98a97abb620d44073

  • SSDEEP

    12288:UPWID8VeuWJO7G/LWmHut5CqDm1kBB4XIMF9GHsoY+K2NeJ/b/XaO8gWSFK+pJSC:UuID8moGTJQ5xn4XIdM+KK4jiT0FK+p

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f696ead7eba6d5df7a2016b5fd193e9e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f696ead7eba6d5df7a2016b5fd193e9e_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3428
    • C:\Users\Admin\AppData\Local\Temp\f696ead7eba6d5df7a2016b5fd193e9e_JaffaCakes118.exe
      "{path}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:444
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 1660
        3⤵
        • Drops file in Windows directory
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:3792
  • C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe
    C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe
    1⤵
      PID:3964

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\f696ead7eba6d5df7a2016b5fd193e9e_JaffaCakes118.exe.log

      Filesize

      884B

      MD5

      1e6b8ce5375d908aff1c0e54dc7b69cb

      SHA1

      e97bf6271939d959798ff9218bfe3b27c97eb7c0

      SHA256

      0f5c3154cd54ca17d0cb4accc7d59649cdf32e037ca2610c0b42127e5ca3c3f3

      SHA512

      17c3b604a0584a22175a143fdad501fc24862cfc58e0015f8e6e80f932452b4bcf95041540458d007bff30d1e7c34d7fdd23d881c4dde3248ce708ea5739411a

    • memory/444-17-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/444-30-0x0000000075550000-0x0000000075B01000-memory.dmp

      Filesize

      5.7MB

    • memory/444-23-0x0000000075550000-0x0000000075B01000-memory.dmp

      Filesize

      5.7MB

    • memory/444-22-0x0000000000FB0000-0x0000000000FC0000-memory.dmp

      Filesize

      64KB

    • memory/444-20-0x0000000075550000-0x0000000075B01000-memory.dmp

      Filesize

      5.7MB

    • memory/3428-12-0x0000000001AB0000-0x0000000001AC0000-memory.dmp

      Filesize

      64KB

    • memory/3428-16-0x0000000001AB0000-0x0000000001AC0000-memory.dmp

      Filesize

      64KB

    • memory/3428-2-0x0000000001AB0000-0x0000000001AC0000-memory.dmp

      Filesize

      64KB

    • memory/3428-1-0x0000000075550000-0x0000000075B01000-memory.dmp

      Filesize

      5.7MB

    • memory/3428-10-0x0000000001AB0000-0x0000000001AC0000-memory.dmp

      Filesize

      64KB

    • memory/3428-11-0x0000000075550000-0x0000000075B01000-memory.dmp

      Filesize

      5.7MB

    • memory/3428-0-0x0000000075550000-0x0000000075B01000-memory.dmp

      Filesize

      5.7MB

    • memory/3428-21-0x0000000075550000-0x0000000075B01000-memory.dmp

      Filesize

      5.7MB

    • memory/3964-15-0x00000000005E0000-0x00000000005F0000-memory.dmp

      Filesize

      64KB

    • memory/3964-7-0x00007FF9A16E0000-0x00007FF9A2081000-memory.dmp

      Filesize

      9.6MB

    • memory/3964-14-0x00000000005E0000-0x00000000005F0000-memory.dmp

      Filesize

      64KB

    • memory/3964-6-0x000000001A100000-0x000000001A4D4000-memory.dmp

      Filesize

      3.8MB

    • memory/3964-5-0x00000000005E0000-0x00000000005F0000-memory.dmp

      Filesize

      64KB

    • memory/3964-4-0x00007FF9A16E0000-0x00007FF9A2081000-memory.dmp

      Filesize

      9.6MB

    • memory/3964-13-0x00007FF9A16E0000-0x00007FF9A2081000-memory.dmp

      Filesize

      9.6MB

    • memory/3964-3-0x0000000000C00000-0x0000000000C20000-memory.dmp

      Filesize

      128KB

    • memory/3964-9-0x00000000005E0000-0x00000000005F0000-memory.dmp

      Filesize

      64KB

    • memory/3964-8-0x000000001A810000-0x000000001A946000-memory.dmp

      Filesize

      1.2MB