Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 08:32
Static task
static1
Behavioral task
behavioral1
Sample
7c5469a4c1c1c75d2b25abc58d084a3f_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7c5469a4c1c1c75d2b25abc58d084a3f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
7c5469a4c1c1c75d2b25abc58d084a3f_JaffaCakes118.exe
-
Size
856KB
-
MD5
7c5469a4c1c1c75d2b25abc58d084a3f
-
SHA1
f84a814858846b0041fe7746799390eb1758f41e
-
SHA256
0fe1101fbf2ad4cb5e1a24aaaf9ccf3b42495cc1af0dbeed41d946e12090ea32
-
SHA512
86a19da8735b1332bb45c49fef3949138840eefccff49822fa1fa2176588381930d121f8de14b660aa11e01dcf762d723d5b7f1bf4e3a4caee9432ee8efc0766
-
SSDEEP
24576:0k6+c2dm2AzwLFv24cHJHbefui0Cy6fOIcRCl:0bHsQ3HJHyfui0CbfOk
Malware Config
Extracted
lokibot
https://erxst.info/bjoe/herold/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2640 dfpmwtafx.exe 2484 dfpmwtafx.exe -
Loads dropped DLL 6 IoCs
pid Process 1936 7c5469a4c1c1c75d2b25abc58d084a3f_JaffaCakes118.exe 1936 7c5469a4c1c1c75d2b25abc58d084a3f_JaffaCakes118.exe 1936 7c5469a4c1c1c75d2b25abc58d084a3f_JaffaCakes118.exe 1936 7c5469a4c1c1c75d2b25abc58d084a3f_JaffaCakes118.exe 1936 7c5469a4c1c1c75d2b25abc58d084a3f_JaffaCakes118.exe 2640 dfpmwtafx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dfpmwtafx.exe Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook dfpmwtafx.exe Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dfpmwtafx.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\dfpmwt = "C:\\Users\\Admin\\AppData\\Local\\dfpmwt\\dfpmwtnak.vbs" dfpmwtafx.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2640 set thread context of 2484 2640 dfpmwtafx.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2484 dfpmwtafx.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2640 1936 7c5469a4c1c1c75d2b25abc58d084a3f_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2640 1936 7c5469a4c1c1c75d2b25abc58d084a3f_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2640 1936 7c5469a4c1c1c75d2b25abc58d084a3f_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2640 1936 7c5469a4c1c1c75d2b25abc58d084a3f_JaffaCakes118.exe 28 PID 2640 wrote to memory of 2484 2640 dfpmwtafx.exe 29 PID 2640 wrote to memory of 2484 2640 dfpmwtafx.exe 29 PID 2640 wrote to memory of 2484 2640 dfpmwtafx.exe 29 PID 2640 wrote to memory of 2484 2640 dfpmwtafx.exe 29 PID 2640 wrote to memory of 2484 2640 dfpmwtafx.exe 29 PID 2640 wrote to memory of 2484 2640 dfpmwtafx.exe 29 PID 2640 wrote to memory of 2484 2640 dfpmwtafx.exe 29 PID 2640 wrote to memory of 2484 2640 dfpmwtafx.exe 29 PID 2640 wrote to memory of 2484 2640 dfpmwtafx.exe 29 PID 2640 wrote to memory of 2484 2640 dfpmwtafx.exe 29 PID 2640 wrote to memory of 1576 2640 dfpmwtafx.exe 30 PID 2640 wrote to memory of 1576 2640 dfpmwtafx.exe 30 PID 2640 wrote to memory of 1576 2640 dfpmwtafx.exe 30 PID 2640 wrote to memory of 1576 2640 dfpmwtafx.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dfpmwtafx.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dfpmwtafx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c5469a4c1c1c75d2b25abc58d084a3f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7c5469a4c1c1c75d2b25abc58d084a3f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\dfpmwtafx.exe"C:\Users\Admin\AppData\Local\Temp\dfpmwtafx.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\dfpmwtafx.exe"C:\Users\Admin\AppData\Local\Temp\dfpmwtafx.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2484
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\dfpmwt\dfpmwtMw.vbs"3⤵PID:1576
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
551KB
MD576971752a16af393810934c9c227a3cc
SHA1b2484686e98e07514e271c3157f066eef98a4f61
SHA256e765e2f26284b82767886e703d67e39ffcad85ae74cdc2905340773263d1838c
SHA512a7aa7501c968f5caf3040124be6b5cd89356cf60b73a2041bb9132baa7ee8a5e65daf51354adffbf7d0ee6665aec610cdf0d3d62e82580eb7422a2c542bcd597
-
Filesize
304B
MD5bc676f349b719de4d38639b0ed71a9db
SHA1216f17c785dd0cf92d0f41cd75740dc9f77943eb
SHA256de8749857f8eacdcda4bb78ae915c55cfbbd65620e04cd1132f61a115a9ca41f
SHA5126e11baf33c0a760b296b23bd9441f8c281121f22ad7fdc258b5b2936a0c332e8718b34d3a9ab8c990540b03b0b423690c30bdc1507133f150eb2fdd8e6a39909
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3691908287-3775019229-3534252667-1000\0f5007522459c86e95ffcc62f32308f1_a42634aa-f501-41cf-bed1-b8158857da02
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3691908287-3775019229-3534252667-1000\0f5007522459c86e95ffcc62f32308f1_a42634aa-f501-41cf-bed1-b8158857da02
Filesize46B
MD5c07225d4e7d01d31042965f048728a0a
SHA169d70b340fd9f44c89adb9a2278df84faa9906b7
SHA2568c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a
SHA51223d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b
-
Filesize
454KB
MD563f99a85eb006bf37643b25e326606b8
SHA19d17305cc333f014719ff69c6bf8e3ae152ff198
SHA256762f79ff49ac45bdaea97ff72c84c355c2f236385a5594b6d53f215f89d9a760
SHA512b851e700422ee65a2f4e1686518ef6d9f0e210c7633dfa3c10b908c0de5755995ec8816f97e9585eeeaf3b302b0204e5acd8c2ae88e5ea1b7e7377894527f24a