Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 09:18
Static task
static1
Behavioral task
behavioral1
Sample
99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe
-
Size
4.1MB
-
MD5
99d95cf99007b5b672e3d8851c249b4a
-
SHA1
6036bf326f26d392f0ed4fbb38dddc21f2718fad
-
SHA256
17f6bf035042d722927ebff748dcabc5d7cb19ba429da72a017e05ca57d8d0be
-
SHA512
17dda269228a32ea2486d42968553f542f2a4dcc73a62a18a9217e3c367572be4b2caa2d13fdc538ac105e6b2dda62ccc4c6dedf63cd34161f68b5dbaa525fa0
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBjB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUp8bVz8eLFcz
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe 99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 1972 locxopti.exe 548 xoptiloc.exe 2368 xoptiloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocMZ\\xoptiloc.exe" 99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintJK\\dobdevsys.exe" 99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4484 99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe 4484 99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe 4484 99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe 4484 99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe 1972 locxopti.exe 1972 locxopti.exe 1972 locxopti.exe 1972 locxopti.exe 548 xoptiloc.exe 548 xoptiloc.exe 2368 xoptiloc.exe 2368 xoptiloc.exe 1972 locxopti.exe 1972 locxopti.exe 2368 xoptiloc.exe 2368 xoptiloc.exe 1972 locxopti.exe 1972 locxopti.exe 2368 xoptiloc.exe 2368 xoptiloc.exe 1972 locxopti.exe 1972 locxopti.exe 2368 xoptiloc.exe 2368 xoptiloc.exe 1972 locxopti.exe 1972 locxopti.exe 2368 xoptiloc.exe 2368 xoptiloc.exe 1972 locxopti.exe 1972 locxopti.exe 2368 xoptiloc.exe 2368 xoptiloc.exe 1972 locxopti.exe 1972 locxopti.exe 2368 xoptiloc.exe 2368 xoptiloc.exe 1972 locxopti.exe 1972 locxopti.exe 2368 xoptiloc.exe 2368 xoptiloc.exe 1972 locxopti.exe 1972 locxopti.exe 2368 xoptiloc.exe 2368 xoptiloc.exe 1972 locxopti.exe 1972 locxopti.exe 2368 xoptiloc.exe 2368 xoptiloc.exe 1972 locxopti.exe 1972 locxopti.exe 2368 xoptiloc.exe 2368 xoptiloc.exe 1972 locxopti.exe 1972 locxopti.exe 2368 xoptiloc.exe 2368 xoptiloc.exe 1972 locxopti.exe 1972 locxopti.exe 2368 xoptiloc.exe 2368 xoptiloc.exe 1972 locxopti.exe 1972 locxopti.exe 2368 xoptiloc.exe 2368 xoptiloc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4484 wrote to memory of 1972 4484 99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe 91 PID 4484 wrote to memory of 1972 4484 99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe 91 PID 4484 wrote to memory of 1972 4484 99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe 91 PID 1972 wrote to memory of 548 1972 locxopti.exe 93 PID 1972 wrote to memory of 548 1972 locxopti.exe 93 PID 1972 wrote to memory of 548 1972 locxopti.exe 93 PID 4484 wrote to memory of 2368 4484 99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe 92 PID 4484 wrote to memory of 2368 4484 99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe 92 PID 4484 wrote to memory of 2368 4484 99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\99d95cf99007b5b672e3d8851c249b4a_JaffaCakes118.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\IntelprocMZ\xoptiloc.exeC:\IntelprocMZ\xoptiloc.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
-
C:\IntelprocMZ\xoptiloc.exeC:\IntelprocMZ\xoptiloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3780 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD534b8061f7aa39d5253fe0a77138643b5
SHA123bd5edf9a9b97455c686b5353ad290d2ea99c61
SHA2569d18fe03613be399cdf624e8821f75aed6374c415600d5bfc010458b6c30c620
SHA5122cc7e6ba66fa47f87768319082635211a16186cca9e6454c2db39e9626b674e78697500978c0156136e7c445579245e5c4af9fa828609399a0cd042c223c472e
-
Filesize
4.1MB
MD5e13726ae8874a72fd5fb1cd975ed78c4
SHA1a44d0f815a1630fe5a6f8b4b2e4d0c0474380632
SHA256802e8a5684995acce8e01b5c92ade7e9880a1896abf01543d536c77647bc42c7
SHA51217f16515ec81069780613a373081179dc0bae43b8b0bfed475012a4c7facbc1615fb7c50a94242c775f24e484165d134433610b2b660974c66de743c599cbd28
-
Filesize
4.1MB
MD59ee4a26badb3174323ff01ff97593e13
SHA16d271fe61955c8f4ec7f122c58a200ef9b265c77
SHA256132b5fe720c21ada51d7774a3ee24b7b87c301afb7c289b5ae74feb0715777c3
SHA51208bdb1333cdbf55fe3f96de2a037797d8d6d126d77486a30049c75c7bd3953fd6339876647fee5e9b18141cbe9fcd3dc9c4b44be12ecf992830b76b333b8b560
-
Filesize
208B
MD5cd9f14e864804df530421b8870ecb042
SHA1f99a74ba8adf7427d7abca1e882b25a8fe4f8d3d
SHA2566734f4e3d23de5283a97ba58fea003b958b5a57154ad6a7da91c7cb03ac11dde
SHA512c3b2c3135b3fc6b261dc596f86eb77abb6f6f193a71808628edfe6996963e955c1cfc54f908b48fa0b2f682ad3373225dc39c812d2de00a187056fb6fb2d7981
-
Filesize
176B
MD58fcea4e2f4149b590528b25bb7b45430
SHA1c84f872e2493eed5af9e939f3778360f48d65cba
SHA256f684b12c017895bf3d4e51538ce5bbd67105d6365e25b85e8021af98719d2418
SHA51258716025a3df3135a67b0e2cd50b836618b3649879edc38b2e57c2d0d77568e604a05707b512d8a0a6bf70905c579e2948c94c9b4eafd66d4de88a6664732f5d
-
Filesize
4.1MB
MD53786c997e29e7fb9c4f7560714906271
SHA16669e14995bd4b25b59ab40b1192adc21a9aeaf4
SHA256e66de0c32dc75dd609c1215bb92ea6f794195938ee83873d90c4f42488acfa71
SHA512a174558575eb6a793a22f4719e42ecd341e5feebf4e4b7a60455bfd2b87b6e4dc6ba8c245ee100b4eeea09afc42fa30b63c87a727d44fdaac90766cccf1cca04