Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2024, 09:18

General

  • Target

    99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe

  • Size

    4.1MB

  • MD5

    99d95cf99007b5b672e3d8851c249b4a

  • SHA1

    6036bf326f26d392f0ed4fbb38dddc21f2718fad

  • SHA256

    17f6bf035042d722927ebff748dcabc5d7cb19ba429da72a017e05ca57d8d0be

  • SHA512

    17dda269228a32ea2486d42968553f542f2a4dcc73a62a18a9217e3c367572be4b2caa2d13fdc538ac105e6b2dda62ccc4c6dedf63cd34161f68b5dbaa525fa0

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBjB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUp8bVz8eLFcz

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4484
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\IntelprocMZ\xoptiloc.exe
        C:\IntelprocMZ\xoptiloc.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:548
    • C:\IntelprocMZ\xoptiloc.exe
      C:\IntelprocMZ\xoptiloc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2368
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3780 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2728

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\IntelprocMZ\xoptiloc.exe

      Filesize

      4.1MB

      MD5

      34b8061f7aa39d5253fe0a77138643b5

      SHA1

      23bd5edf9a9b97455c686b5353ad290d2ea99c61

      SHA256

      9d18fe03613be399cdf624e8821f75aed6374c415600d5bfc010458b6c30c620

      SHA512

      2cc7e6ba66fa47f87768319082635211a16186cca9e6454c2db39e9626b674e78697500978c0156136e7c445579245e5c4af9fa828609399a0cd042c223c472e

    • C:\MintJK\dobdevsys.exe

      Filesize

      4.1MB

      MD5

      e13726ae8874a72fd5fb1cd975ed78c4

      SHA1

      a44d0f815a1630fe5a6f8b4b2e4d0c0474380632

      SHA256

      802e8a5684995acce8e01b5c92ade7e9880a1896abf01543d536c77647bc42c7

      SHA512

      17f16515ec81069780613a373081179dc0bae43b8b0bfed475012a4c7facbc1615fb7c50a94242c775f24e484165d134433610b2b660974c66de743c599cbd28

    • C:\MintJK\dobdevsys.exe

      Filesize

      4.1MB

      MD5

      9ee4a26badb3174323ff01ff97593e13

      SHA1

      6d271fe61955c8f4ec7f122c58a200ef9b265c77

      SHA256

      132b5fe720c21ada51d7774a3ee24b7b87c301afb7c289b5ae74feb0715777c3

      SHA512

      08bdb1333cdbf55fe3f96de2a037797d8d6d126d77486a30049c75c7bd3953fd6339876647fee5e9b18141cbe9fcd3dc9c4b44be12ecf992830b76b333b8b560

    • C:\Users\Admin\253086396416_10.0_Admin.ini

      Filesize

      208B

      MD5

      cd9f14e864804df530421b8870ecb042

      SHA1

      f99a74ba8adf7427d7abca1e882b25a8fe4f8d3d

      SHA256

      6734f4e3d23de5283a97ba58fea003b958b5a57154ad6a7da91c7cb03ac11dde

      SHA512

      c3b2c3135b3fc6b261dc596f86eb77abb6f6f193a71808628edfe6996963e955c1cfc54f908b48fa0b2f682ad3373225dc39c812d2de00a187056fb6fb2d7981

    • C:\Users\Admin\253086396416_10.0_Admin.ini

      Filesize

      176B

      MD5

      8fcea4e2f4149b590528b25bb7b45430

      SHA1

      c84f872e2493eed5af9e939f3778360f48d65cba

      SHA256

      f684b12c017895bf3d4e51538ce5bbd67105d6365e25b85e8021af98719d2418

      SHA512

      58716025a3df3135a67b0e2cd50b836618b3649879edc38b2e57c2d0d77568e604a05707b512d8a0a6bf70905c579e2948c94c9b4eafd66d4de88a6664732f5d

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe

      Filesize

      4.1MB

      MD5

      3786c997e29e7fb9c4f7560714906271

      SHA1

      6669e14995bd4b25b59ab40b1192adc21a9aeaf4

      SHA256

      e66de0c32dc75dd609c1215bb92ea6f794195938ee83873d90c4f42488acfa71

      SHA512

      a174558575eb6a793a22f4719e42ecd341e5feebf4e4b7a60455bfd2b87b6e4dc6ba8c245ee100b4eeea09afc42fa30b63c87a727d44fdaac90766cccf1cca04