Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2024, 22:27

General

  • Target

    61201493419f2cfd038edd380361f70e_JaffaCakes118.exe

  • Size

    927KB

  • MD5

    61201493419f2cfd038edd380361f70e

  • SHA1

    7475880b664e50441ad678af439f374e0a7fb50c

  • SHA256

    763a5e112a2cac4106ceba50be268c204883c12dad474571d0f06bfeb2db28a6

  • SHA512

    0be7af416f5c0d79d9b6bbd3a4e711b13315a5f5511d028884ff24a07e82482e7e008607205a6e9a3aa1ba6702c0706e7fb4d171e7753c1107d626a68069e352

  • SSDEEP

    24576:lxt7Vb7vMTCT2xDEF0RWUEF9eVMOU+eBPava8K:lDV3vMUU9g/MneBPava8K

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61201493419f2cfd038edd380361f70e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\61201493419f2cfd038edd380361f70e_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c echo jNpILxZa
      2⤵
        PID:2176
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c cmd < kdDDQohzzOeDMawC.com
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2400
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:3000
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 1 HLDhP.Trej
            4⤵
            • Runs ping.exe
            PID:2596
          • C:\Windows\SysWOW64\certutil.exe
            certutil -decode oakwUjXu.com Q
            4⤵
              PID:1296
            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\dllhost.com
              dllhost.com Q
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2464
              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\dllhost.com
                C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\dllhost.com Q
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:320
                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
                  "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe"
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Modifies system certificate store
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1128
                  • C:\Windows\SysWOW64\cmd.exe
                    "cmd.exe" /C taskkill /F /PID 1128 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe"
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2176
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /F /PID 1128
                      8⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2696
                    • C:\Windows\SysWOW64\choice.exe
                      choice /C Y /N /D Y /T 3
                      8⤵
                        PID:2844
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1 -n 3
                4⤵
                • Runs ping.exe
                PID:2572
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "
            2⤵
            • Deletes itself
            PID:2460

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          3563fa42e154e82ad2e521cd8b73f9a9

          SHA1

          30570dd0f164dba91b365851e892afba47a00b34

          SHA256

          4a820baf6453de0f30f0141e74fcfebd596cf33dd5d6172a4e4d0e0c611a103a

          SHA512

          0955582bbb85fc4949dafb08e5ab13767a10dddddf29d6a3dc1ca6bf696b4d45c5362eb99d24e45e82300ecfed6e9b9ed60391c28ba92d81c13ac2b17d0d6774

        • C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd

          Filesize

          264B

          MD5

          b6be4f2d0c69bf65311e416288f558ec

          SHA1

          5f9789d858cd5803083c2905385972c4075ff536

          SHA256

          faa55046454144bd6160bbc449610d29671bd1456afd5c4fdce66a71628b6f60

          SHA512

          4fcba9ace47f9aeec9ac5ad778328a9018704a6b57e24aa965cc3c01109f553e3319f79b8566d9cf32ac814ba7b503b4954d250f7ff1d09d75c5ab74b8553aaa

        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\ElwQXJLljZ.com

          Filesize

          921KB

          MD5

          392e5cc019e763f0019337277db81081

          SHA1

          9402765f17c7e2b0cf15520ffef56476a855ab2c

          SHA256

          852ed04ac131800dae464471a51a7d54063dad88ce1ebab7ce22fcab66900d01

          SHA512

          4e0de123e4ff6f40bacded145bc0505a73a2cf39ff01878b8703b1dd6fc0059d4ce1e39c0d6043b389b7ecee0126e326c6e258b0bf472bf297179b3b945db553

        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Q

          Filesize

          614KB

          MD5

          e20e62330bad6efc86c7d14843cb7f88

          SHA1

          307e83a8831ca201aa54cd43baa615eb73e01559

          SHA256

          60a4c7b8bae6be0f25c19d9e7af3934984b1027d3c159277f0e2af25365fed24

          SHA512

          e824d53c9fa44c2c9ebbe0c476ebf82b4509343f8dc11bad312dc5bf0997dee301dc60b1d5a9b385fa1297b4b74d5cdb3960733ea72ce815bfd964dc0f0d70fb

        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\ZjhzASQfbvkXa.com

          Filesize

          123KB

          MD5

          6d37a4edfc74a1e6048dff3905869a6f

          SHA1

          0689d0c8794154013632f9dd0303b9cdc54b1114

          SHA256

          7c4736bb159e8e383178028590da6eeb38182247203c0da89b7ec2ca39e57fb8

          SHA512

          3d9cec9585a0f8eeb1b566299b351dcc6fab6dc02edaa02b51af2dbcf3f6190d395b83281bc129ef91bd44824ece8e5eaa7b96248d4ae3330db20fadd83e68e2

        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\kdDDQohzzOeDMawC.com

          Filesize

          2KB

          MD5

          9919b22087c6d3abcb33c95c85cd1a72

          SHA1

          d4bd348f984d2685e0bfc3c8575df11c7767dd09

          SHA256

          473fb806481b1fac8b0ecfe4d96c645630d685aba857fa9a6b556874255f1450

          SHA512

          00fc7e50ffe66097101813ac408a1598d85a855326410677ad4adb2ecf82b94c8168b5d45205a910d1613ae824dd1630d38cc12d0d7fa801cd2f5541532c50fe

        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\oakwUjXu.com

          Filesize

          845KB

          MD5

          93169ee2c69f8ec0c1fa0772d3227422

          SHA1

          3988c594382f0dda573da6f037bbb5e205ae9be3

          SHA256

          d6577ca47801a85d9a5e7a80425934aa6c43b743d1115ad09f798f3be5c194a8

          SHA512

          0ba7ac9246d006b203156b6d5f9b6a096adfa76ab5544b62ca05ba91c1f138aec61a241cf015cbc61cb49cb7bb1fef2768403f2c51d5ea27ee410073d54710dd

        • C:\Users\Admin\AppData\Local\Temp\CabB5D9.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\TarB6DA.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • C:\Users\Admin\AppData\Local\Temp\tmpD2ED.tmp

          Filesize

          130KB

          MD5

          511473ed599ffee4318413791fab1de9

          SHA1

          c1f0856d731676e528c24ae89c8a67c5d4193d8a

          SHA256

          f9cf0de51a3a613de3ff44affffe58ee4b5124c42ce4b2bb8a4cebe7516faafc

          SHA512

          242155b015ac845cdd04dcf7efc6d88b612904ebae1d49df10fe3f3dc0b11b4e40541e0612b30f4105183dbfbba6ec0a9be9ddf4890dfbb236ebcc00dda3ef78

        • C:\Users\Admin\AppData\Local\Temp\tmpD2EE.tmp

          Filesize

          46KB

          MD5

          02d2c46697e3714e49f46b680b9a6b83

          SHA1

          84f98b56d49f01e9b6b76a4e21accf64fd319140

          SHA256

          522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

          SHA512

          60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

        • C:\Users\Admin\AppData\Local\Temp\tmpD304.tmp

          Filesize

          92KB

          MD5

          18e04095708297d6889a6962f81e8d8f

          SHA1

          9a25645db1da0217092c06579599b04982192124

          SHA256

          4ed16c019fe50bb4ab1c9dcedf0e52f93454b5dbaf18615d60761e7927b69fb7

          SHA512

          45ec57bddeeb8bca05babcf8da83bf9db630819b23076a1cf79f2e54b3e88e14cd7db650332554026ab5e8634061dd699f322bcba6683765063e67ac47ea1caf

        • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe

          Filesize

          63KB

          MD5

          b58b926c3574d28d5b7fdd2ca3ec30d5

          SHA1

          d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

          SHA256

          6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

          SHA512

          b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

        • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\dllhost.com

          Filesize

          921KB

          MD5

          7098bdf41092092927874259196e5d80

          SHA1

          7ed19875c88e93fe3c0cc38b8bff56c61d0a8307

          SHA256

          140864a83fd7c075010791ea30de0acf1ec4725febb1c30dec785b7a893d8558

          SHA512

          dcb5a1e7fa194546cdf0186d949eb16a638d9f0cdef9f0f149b13e27d046d36d196e4ea7c6ae7d733eaaca31ce1ebd3b11b614ce2607729b9e97feb18e282b03

        • memory/1128-39-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/1128-38-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/1128-36-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB