Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 23:29

General

  • Target

    326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe

  • Size

    188KB

  • MD5

    326d685885fdef82aed76fb7ca1de91a

  • SHA1

    ccfc2ac6fb5aadbf27ee5219086dec868f15bc14

  • SHA256

    02530907805306c6942e2747293f7c05648387210babba4124f91d01e875ff08

  • SHA512

    612831831e3f5d5b438f516e19d281fb16595fd16e5ef9049c7fa95710aefc86be62b80cf3a57946565046da91bacb8868afd6867d16f64e562868e7132675d1

  • SSDEEP

    3072:AgXdZt9P6D3XJkK5+YWAy5KP4xASuXlUhiQcJE9BTdkj2h1GVDhyI1KUrV/5hkrt:Ae34R1WigmrXl2c25nMQUp/5hG6ZLE

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Program Files (x86)\Interactivy\install.exe
      "C:\Program Files (x86)\Interactivy\install.exe" Y;C:\Users\Admin\AppData\Local\Temp\326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe;20341687
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1756
      • C:\Program Files (x86)\Interactivy\Interactivy.exe
        "C:\Program Files (x86)\Interactivy\Interactivy.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of SetWindowsHookEx
        PID:2088
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c \weersdins.bat
        3⤵
          PID:4372

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Interactivy\Interactivy.dll

      Filesize

      79KB

      MD5

      b99bbb500e7e2edc693b323801b7c5db

      SHA1

      7747d327e4108ca84996e499df1aaa8de0bc3cd0

      SHA256

      6f86f6ac2e57bbd73c028fc0b20a2822e0c45c734c7191bb4e746a0034994580

      SHA512

      cf9c5700c292e5c114b29385b7d56e6c01ad13f962cb4ce860d085529bd5a1955b79585120986abd0f8c137140fb36783b397286d2763291bb705619bd355ac2

    • C:\Program Files (x86)\Interactivy\Interactivy.exe

      Filesize

      47KB

      MD5

      1894d7120de283e8c53dede80618e8b3

      SHA1

      989cf8fc47daa325cc2b475542c012ba3134c669

      SHA256

      1ff3c1dce91011480253b4bb89f53464ed57cfcb44fd2935be6947fc48688c93

      SHA512

      53e47c3aa34779ec25efd7ad2cb87797752ed9b9f44d68147dff124d82e00660bf1bcd2bdde602cccb63b723f7e0db0cd732fd916046c4687ea37bd77473884d

    • C:\Program Files (x86)\Interactivy\InteractivyH.dll

      Filesize

      79KB

      MD5

      279e74787cc19f429cf030d6aca7396c

      SHA1

      dfb8f9ae3d62a1534c09008f5f918a2150f29c1d

      SHA256

      d510e6c35b68eead339b82fc74b27719b63594a4469a6924e9bd4022054f9abc

      SHA512

      2515ea8f586efbde955b2932af2fdff517b92c5b79a6e55c76084f080220b1eea5686dcad6a44c6627e8c456fffc3cd6fc7565c688ccebaffcece0a7f797cbe6

    • C:\Program Files (x86)\Interactivy\install.exe

      Filesize

      47KB

      MD5

      23e2f689669b10cf4031040d2bbe2dd7

      SHA1

      1a0477aea4b8c631e7989b60108c1d48e7cc448f

      SHA256

      6a7318f019a9cb7f86da32883425f39289f72818fd349cd4bd0a363e6459a8f7

      SHA512

      fbcd845bbac7c152b3031fa9cde9b952e151e7618aa21e0b66161058fb1ed382a9fb6b67db50cf9d62d6f2d1d87be8ca0a1d2176ca11d40129ab5f44a91e2b48

    • C:\Users\Admin\AppData\Local\Temp\nsrB17E.tmp\System.dll

      Filesize

      11KB

      MD5

      c17103ae9072a06da581dec998343fc1

      SHA1

      b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

      SHA256

      dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

      SHA512

      d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

    • C:\weersdins.bat

      Filesize

      156B

      MD5

      7597e9f2148a809abe2863bf6b934774

      SHA1

      2ba20753e4d1b19ee19e937c253074386807c51e

      SHA256

      85c0ffb21ed018df813e67b7c02e6ebcaf21bec3d91c0c9445095b883fe22641

      SHA512

      2a3600f2f6ce9e7e2ca081abcfbc0c1a7917e6f369eacc3b29fe993bcfebe980d6cf4a81317ea86d58dc0c7660ba896824c7be03f6ca214effc011e43160126d