Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 18:08

General

  • Target

    35d1314f1811da3b12b2f6fc9957e0c3_JaffaCakes118.exe

  • Size

    251KB

  • MD5

    35d1314f1811da3b12b2f6fc9957e0c3

  • SHA1

    49a8533b1ea59643f51bf7c57121907a69e72ce4

  • SHA256

    76f77637f8d9fd7a305d87740b4003432641d90d0726f25046aedd72b6dd23b2

  • SHA512

    c5f0bbf2f7a2eeea62cd5024b26555d9a039d51eedec31898cf77524c8b153040becabd0f768d4c552a7c24fb94d40843a65b68fc8a414ea6e50632c5de53346

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4sTvHq8dgSkFpmqWCFqCw:91OgLdanAqTFhw

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35d1314f1811da3b12b2f6fc9957e0c3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\35d1314f1811da3b12b2f6fc9957e0c3_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3160
    • C:\Users\Admin\AppData\Local\Temp\7zS9A5B.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:3128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Bcool\uninstall.exe

    Filesize

    46KB

    MD5

    8be20144dbd200c6de0c9430ed9280cf

    SHA1

    b81e3aacaaedd66ef0896acabc6983c94758e2b4

    SHA256

    634557ab79a29fe800721bc5f146a9b86799b72eb6755e821492f85ca66818a6

    SHA512

    fd7db954002be6332c8c6f4500fc38c1d5286022bb56f21b97567e837ee3d5a3c6db08cabcd2ffe405e7180918d6bb0b57b330703a9d045851901d01115ff94e

  • C:\Users\Admin\AppData\Local\Temp\7zS9A5B.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    1ea48e82d5c30d17b4f767d24d2b931b

    SHA1

    a66ee0461eec71405db0d55f8a99f65347cfa2d7

    SHA256

    e12cf6794432571425714261d2118728536cf283963cccf8f1f7439945acd19e

    SHA512

    1e098ebeead00045a2c42525b2874fb107096ced44f6240a22317957293ead172ec18da183db4cbe1fb02a7ea7e9e1dd37d01caba44830e8b9dbf52d99e56a96

  • C:\Users\Admin\AppData\Local\Temp\7zS9A5B.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    073ff65bdffe070c3cbeb494439627d3

    SHA1

    faf0662cb7f93d6d552fe7d023c27ea7876d11ec

    SHA256

    09ce8bbf0b6185db7c005c2baee73e6d680479e80fe848fd1343750d3d6d9965

    SHA512

    c7c78e17e25369831ad6f2006cc66c2d8b3e7d8734ad9faea691baa6e9a535f8214bb80cc364aed3dfe31303fd4197f4b796597e5427d19db7316893ac67388f

  • C:\Users\Admin\AppData\Local\Temp\7zS9A5B.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    4dcd08adcb9ed37934bd519c54b94f0f

    SHA1

    7743a16220e4113f4472f46779284da3874b8803

    SHA256

    0cd6c1e5cde228d9e0754f8c1094b1737d2c0dd4dce10ff7d761f1238837aa98

    SHA512

    75f50213d1a7bcfef9aa7b80f2851184a7cf3e2ed8afe7cd6b94b6e40692ae64faaa413077bb5a9490743fce42f9618b65f030739d5b590df5e0dad3604aa1dd

  • C:\Users\Admin\AppData\Local\Temp\7zS9A5B.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    244f46a1c06f4403878f816e868fdc1b

    SHA1

    a6673ad09f4cf99a62860163d87d5835216eb9bd

    SHA256

    2a0f3879d3936592d6f98a75943912d5dbad313fd76bb100bdf42856f9657ef1

    SHA512

    91fe85d0c4c1f2e45ab5954295b93e2736f687b38b7735a44539c1ce2be45c3d831a1d43399b86e661ae301a917cc52310954d094b8c9c895cc78c31641bf76e

  • C:\Users\Admin\AppData\Local\Temp\7zS9A5B.tmp\[email protected]\install.rdf

    Filesize

    705B

    MD5

    062dec917b21499e80d3521def153b7d

    SHA1

    b213565a312d4a4f963073806b8cf524f356f03f

    SHA256

    030bc92912854ac5ccef3a59cbd2aed1403c2ff7effc1173028d7f81cdd62200

    SHA512

    eefc1836308bc073638b1f706806901d88f0507f90c15fc6ef2770bf6dc962e64df66ea1a28e477da12a5dcf26ee5ec1a05b733bbd44676186b08faa1d0a6983

  • C:\Users\Admin\AppData\Local\Temp\7zS9A5B.tmp\background.html

    Filesize

    4KB

    MD5

    c372e4d14e81ccfff28cb27cff1b1cd6

    SHA1

    53ed804d6dfcc97cdd17c5ac38cc9077816d2e8b

    SHA256

    b9e3deab6c2c67e458e8abb82969b7a04ccfa7ab6662a42158d9e8479a8bae8c

    SHA512

    7f8132d65fc8ab46cc8dee8cb7a44c329b5235074645b5a000c32d3b506c9502930fd81727d7af02bb953c3b23ef8f587f662f9e18facd8c56c92e55f3363754

  • C:\Users\Admin\AppData\Local\Temp\7zS9A5B.tmp\bhoclass.dll

    Filesize

    139KB

    MD5

    4b35f6c1f932f52fa9901fbc47b432df

    SHA1

    8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

    SHA256

    2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

    SHA512

    8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

  • C:\Users\Admin\AppData\Local\Temp\7zS9A5B.tmp\content.js

    Filesize

    387B

    MD5

    8d7be65caa5f6daac8316048b0d2eac2

    SHA1

    b0727d5b71318a73859616d33031591e63181e2b

    SHA256

    8d055be6f408351be6097a4d30179907f5c37ec0b5413f73096c8fee25d408e4

    SHA512

    235bf789a4d5154cc24afcb71192585ce58d54ec00a5cba5983c4ac2f7641b91b6d68cac34c1c14d2a324c45ab977e5c510b8552f0a877bbb92add451a2c1461

  • C:\Users\Admin\AppData\Local\Temp\7zS9A5B.tmp\nlkaodoalebodnnkeifjaohmfijmkaaa.crx

    Filesize

    3KB

    MD5

    bc7947d9e8cc79d8f9bd4c643c8dda09

    SHA1

    599c5937fa962f051fdac27f9666ef6834767b28

    SHA256

    8a98da717074d0a706e884dd15d5edefc3a41645db5ebf19a41d9bebe170e832

    SHA512

    dce2a965d2da1f7323ba988431860184db81594f07c07d48749da95354f2c1b7c2be2e3754d39337b4a7e140722607895a19f47f7257f6a96ad1f80a3c4e2ce8

  • C:\Users\Admin\AppData\Local\Temp\7zS9A5B.tmp\settings.ini

    Filesize

    650B

    MD5

    e910feea96466cc7c33b7bd56b86175b

    SHA1

    4c729f62a231dc7d69945305c97264b78f39a921

    SHA256

    cd0d50e5173283171d05391093ba5286d5aea08cec5a93c9f83f6a1ae2097285

    SHA512

    e77dcd85623f088e35bea869bc32a7215e11cadf64313067e26f0fc7d33d99158194db455108369bbdb688d901955d165095c237c96e256071ca3fdafb5fe5e2

  • C:\Users\Admin\AppData\Local\Temp\7zS9A5B.tmp\setup.exe

    Filesize

    61KB

    MD5

    16ef6e914973925977cdc5ef6b8b2565

    SHA1

    4815da2815975b33f5dc94d482e6dbc02588afa6

    SHA256

    6b9a2b64b90799f1d50458dc38fb4e9e13a8abb37210c8f5d9eeedae84c6912f

    SHA512

    c74f0e17878c4598b626edb5e75e7ee098b71c0c26454ba709e2ea438517670ce11abf7d909470e6c935a21d0413c0d14b29960af9bd6a423e3261789a35b059