Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/06/2024, 02:29

General

  • Target

    b155bc0fe5e27121ec1a6f8a23992726_JaffaCakes118.exe

  • Size

    4.0MB

  • MD5

    b155bc0fe5e27121ec1a6f8a23992726

  • SHA1

    d0c4345974ceede74670036a89af9061f6f42e56

  • SHA256

    b474b15d0895ef9f6bd317c0aa884878360701f96e98ed5006529e2c53acb8cd

  • SHA512

    b27dfcbe1530dba99247d4f5386564e7db304b7520cfe5fa6daa1cabfac322ee5f1d28b8221f430db0b933d3f20eac500152cc033873a8e4545b1275b9334a90

  • SSDEEP

    98304:X7J54jjrClrspscKRdyhr4Ntw+IWWbVF22fzf2B:X7EGlrOThCnoFX2B

Malware Config

Signatures

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b155bc0fe5e27121ec1a6f8a23992726_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b155bc0fe5e27121ec1a6f8a23992726_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Users\Admin\AppData\Roaming\NTLocalData\SkypeC0SvcService.exe
      "C:\Users\Admin\AppData\Roaming\NTLocalData\SkypeC0SvcService.exe"
      2⤵
      • Sets DLL path for service in the registry
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4012
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k "MsHubSvc4" -svcr "SkypeC0SvcService.exe"
    1⤵
      PID:1940

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\NTLocalData\SkypeC0SvcService.exe

      Filesize

      7.7MB

      MD5

      f5fe906f801d99fafa8a9e0584a37008

      SHA1

      a80175b91e3f9606e63dd0d9a9271e23bbe10321

      SHA256

      10b12825603dc3f1946bfd4e7cbebda5885fe4fccaeb0df8b6e862ad3dad720b

      SHA512

      ae149680b212cf0b7f11d841cede275d8e510d3af86c96d75ff75802a8543773a5b7fc9d4c84d4d5fa486d2ddf27129cc42e70d0ea34ca2624f14152ba7497de

    • C:\Users\Admin\AppData\Roaming\NTLocalData\TeamViewer.ini

      Filesize

      154B

      MD5

      5b71453ec471c85212da6fd1cc8d6faf

      SHA1

      68f126c3207a723dea81a07315f63f7bfc76424f

      SHA256

      11171890b6a5de0df0289fbba78fe8c3e47b3cf77866e60abba0170c3ac2043c

      SHA512

      15b8bbe8fab86b8dbeab48795d7fe09665b3bed0f6068b1129e634d06ccfde202210fa6e700e184cf85702c0016fb0432f3bf33a091dc246eef09c3f61087fb6

    • C:\Users\Admin\AppData\Roaming\NTLocalData\TeamViewer_Desktop.exe

      Filesize

      2.2MB

      MD5

      36738935b6eadbdf570002ee44990360

      SHA1

      2621f86a0307a6be7032266db868c7af981bc016

      SHA256

      46aa5507bf0866d924a7974e7dc9255db21efb8ba5dc15e3c1a19c5b408ad29c

      SHA512

      5737edd344008832b1925972913cb2ba49d1e177a331a5419c5f6cb966f7da735fff1722acf59d5514cf63c2834a5f49d9784b70996fb0186cbbab6de3835f14

    • C:\Users\Admin\AppData\Roaming\NTLocalData\TeamViewer_Resource_en.dll

      Filesize

      285KB

      MD5

      5850b0e30cb6493170ea8d073f34766c

      SHA1

      d80b0181edca5be738f8c1c4355c4785d0360d06

      SHA256

      97f8b0f6307156c0c74f3309195c376e5d816b3dbd65048c241a8b7e9233eeda

      SHA512

      a1a8ee334ef763a78214fbc6a915e9adbf0cdbafb6694fac6e70cb68f2aacfcad945c7b4629bf3b729e8b9b3fcd7956c04a63c89fb6bda7111f41f9c8cb96144

    • C:\Users\Admin\AppData\Roaming\NTLocalData\TeamViewer_StaticRes.dll

      Filesize

      2.5MB

      MD5

      4202e46ac536822fd7043c38e66d0ec8

      SHA1

      c8908477b539931168e9437d4e17e7c33fb10141

      SHA256

      542075ba11aaa6c1961985818dc4bb9e1a13afffeaef3514389444db18938fb4

      SHA512

      20210b8dd54b7ca527e69699ae02d6b1c1733e8e3c8ae797994d24b2134e91d4dbc8345b9a4757ded6a34f460d9ec88b1c133202718e342c9045c77de2bd784d

    • C:\Users\Admin\AppData\Roaming\NTLocalData\msimg32.dll

      Filesize

      70KB

      MD5

      0b4279955a1709d04838fc3183d7342e

      SHA1

      747b72e37d21773f9cf50d914033b153a0940975

      SHA256

      1948fe4befb8f7846a7461e01f1c60a0096a941afd7fb16e47794c26a89e99a8

      SHA512

      c5a05c7613613636aaa82ba497e0372d08e5748484bddfebd5073f5084e79a3d1567b2a9475c1ef8688eb15d2ac8c48fca23b9491b056594b2294811d05154ed

    • C:\Users\Admin\AppData\Roaming\NTLocalData\photo_2017-09-29_19-11-18.jpg

      Filesize

      270KB

      MD5

      0a7375b12bfd57b8c1b1268bcbbf7ad1

      SHA1

      c6b0a8f339f343f9f2a8aa25e834115f477dba9e

      SHA256

      4c9ec814c42bcd15f7aa0671870cdaf268fdc55c1a003c622ee1fc4e59e3cc40

      SHA512

      c18401399973c0ef3b82c67c9092aae4c10054a75e770060154f956b50e069123a223f89e54d13104dc3be4a8e4ff3dbaa1a5bf156f7fb3d1d6314fe67d37a1c

    • C:\Users\Admin\AppData\Roaming\NTLocalData\tv_w32.dll

      Filesize

      66KB

      MD5

      55b4875e6dd84b1a547a91a789515dfb

      SHA1

      ad598670ced636134f85c744f6283a16e3766d1f

      SHA256

      a0791b2f732fdd0c26483d9ef2d77e720d9ba267f887eccadff227bcf247a0a9

      SHA512

      d9dc737c25a56503bba8f3a2fa030c3dc1fe62f4313cb307203cdcac164fd6bb2fa2ab87be6806d4cf3d1ed1ec880a1c7f3d866e61c3a6005ca400ff9f99459a

    • C:\Users\Admin\AppData\Roaming\NTLocalData\tv_w32.exe

      Filesize

      104KB

      MD5

      c16719e5c670b7c18aab69dea8ea8c66

      SHA1

      95c9c3b44dcca278b42cb20b1e27d88ae4006f39

      SHA256

      c23d33f637c3c90ce0e3fc366fce034c5592dd80b660f469619e38b255532689

      SHA512

      9bae42f6e6ace1e1f0d923894399817a017a1e52e2b01bb780d2a7be20f82ac341b1c9f6de680f16a0b8d5532c0f77f495dde2ad0c95ff85118021785dcd3b3b

    • C:\Users\Admin\AppData\Roaming\NTLocalData\tv_x64.dll

      Filesize

      80KB

      MD5

      6f68147027ba59a8af86ffe1b8fc6899

      SHA1

      99bb32e1d752a2b93bcd9db36b8a4f3c01ba6458

      SHA256

      07413a73f7566173b462d7a4de2ca74d211f0872682160afafa618e656cfe9e6

      SHA512

      5011e05ebcf6e86a988ba79e3f0aec2f240b14c5a602260edc53fa1c4b11c23495171213fe30ab8bf53f9e0c15e6dffa6a463105d1d558a3def50fdc28e571d2

    • C:\Users\Admin\AppData\Roaming\NTLocalData\tv_x64.exe

      Filesize

      126KB

      MD5

      8e50a67752bd070fec717216b9376a7f

      SHA1

      19c776fd0fe89d6cb3f372d89cac4adf65dabe24

      SHA256

      f7b239c4101db7c974eef31ba2dd42fba0e898cfa762b1e969f76a7a37aa3d8b

      SHA512

      be16f2fc675d1231275fd618ea101bfafa71c31b2cea92c5fb1197384bd0ea764e4567350bc1309d9d83439a977ed7600c57c4f5be81bf7170b2d5e59fe1ef46

    • C:\Users\Admin\AppData\Roaming\NTLocalData\tvr.cfg

      Filesize

      457B

      MD5

      a5f5c911806e3ec4162eec75ce7e76c4

      SHA1

      cbbe893579e62153b178acb3c3e09dfcb839ddf8

      SHA256

      13167a08fcb35d5c8c10ae37c83a626e8e9af5732e71da3bedff20259565a74e

      SHA512

      c8b2df6c83f914eda3af7cd25bd61ba704f76befa7e4f79e5a3ee127b6308f49dd492aaf8e76d4b9d68bbc22feee91c5637cc912c1913df4039ea0d9c3bb681d

    • memory/4012-42-0x0000000010000000-0x000000001001D000-memory.dmp

      Filesize

      116KB

    • memory/4012-30-0x0000000010000000-0x000000001001D000-memory.dmp

      Filesize

      116KB

    • memory/4012-25-0x0000000010000000-0x000000001001D000-memory.dmp

      Filesize

      116KB

    • memory/4012-43-0x0000000075D90000-0x0000000075D91000-memory.dmp

      Filesize

      4KB

    • memory/4012-49-0x0000000075D70000-0x0000000075E60000-memory.dmp

      Filesize

      960KB

    • memory/4012-24-0x00000000738C0000-0x00000000738D6000-memory.dmp

      Filesize

      88KB

    • memory/4012-55-0x0000000075D70000-0x0000000075E60000-memory.dmp

      Filesize

      960KB

    • memory/4012-66-0x0000000004640000-0x0000000004667000-memory.dmp

      Filesize

      156KB

    • memory/4012-70-0x0000000010000000-0x000000001001D000-memory.dmp

      Filesize

      116KB

    • memory/4012-71-0x0000000075D70000-0x0000000075E60000-memory.dmp

      Filesize

      960KB

    • memory/4012-72-0x0000000075D70000-0x0000000075E60000-memory.dmp

      Filesize

      960KB