Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3b3cc763a76...18.exe
windows7-x64
7b3cc763a76...18.exe
windows10-2004-x64
7$PLUGINSDI...us.exe
windows7-x64
7$PLUGINSDI...us.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/Fire...st.dll
windows7-x64
3$TEMP/Fire...st.dll
windows10-2004-x64
3content/cck/cck.js
windows7-x64
3content/cck/cck.js
windows10-2004-x64
3App/Defaul...ice.js
windows7-x64
3App/Defaul...ice.js
windows10-2004-x64
3App/Defaul...cck.js
windows7-x64
3App/Defaul...cck.js
windows10-2004-x64
3App/Defaul...all.js
windows7-x64
3App/Defaul...all.js
windows10-2004-x64
3content/fl...DAP.js
windows7-x64
3content/fl...DAP.js
windows10-2004-x64
3content/fl...Got.js
windows7-x64
3content/fl...Got.js
windows10-2004-x64
3content/fl...ot.exe
windows7-x64
3content/fl...ot.exe
windows10-2004-x64
3content/fl...lay.js
windows7-x64
3content/fl...lay.js
windows10-2004-x64
3content/fl...mon.js
windows7-x64
3content/fl...mon.js
windows10-2004-x64
3content/fl...lay.js
windows7-x64
3content/fl...lay.js
windows10-2004-x64
3content/fl...der.js
windows7-x64
3content/fl...der.js
windows10-2004-x64
3Analysis
-
max time kernel
135s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/firefox_plus.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/firefox_plus.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$TEMP/Firefox/firefox_inst.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$TEMP/Firefox/firefox_inst.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
content/cck/cck.js
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
content/cck/cck.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
App/DefaultData/profile/extensions/[email protected]/components/cckService.js
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
App/DefaultData/profile/extensions/[email protected]/components/cckService.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
App/DefaultData/profile/extensions/[email protected]/defaults/preferences/firefox-cck.js
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
App/DefaultData/profile/extensions/[email protected]/defaults/preferences/firefox-cck.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
App/DefaultData/profile/extensions/[email protected]/install.js
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
App/DefaultData/profile/extensions/[email protected]/install.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
content/flashgot/DAP.js
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
content/flashgot/DAP.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
content/flashgot/FlashGot.js
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
content/flashgot/FlashGot.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
content/flashgot/FlashGot.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
content/flashgot/FlashGot.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
content/flashgot/filepickerOverlay.js
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
content/flashgot/filepickerOverlay.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
content/flashgot/flashgotCommon.js
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
content/flashgot/flashgotCommon.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
content/flashgot/flashgotDMOverlay.js
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
content/flashgot/flashgotDMOverlay.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
content/flashgot/flashgotGalleryBuilder.js
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
content/flashgot/flashgotGalleryBuilder.js
Resource
win10v2004-20240802-en
General
-
Target
b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe
-
Size
10.0MB
-
MD5
b3cc763a76402e48178b277e21feb079
-
SHA1
e203fe02a0962b83f73895a1c03cbdac4a4953f8
-
SHA256
76557b0f1da2b21272c8a141ead19e15851bc8ab104c59f50e6651ebebfcf379
-
SHA512
4d448a4ead0e042d06d8b45a9c4c8c42522df6fb4b752e22b8b0876ac9c0eac924e30f9eb309422cdf81df5ffdfe18448f82da9f7bc97d2d863a7a8051f38a0c
-
SSDEEP
196608:UqvYPMj6hAXhmhSwkeUpuz3//Y1NvTdWBV36ZdtR6+fdnE7imhieu:paMjmYmhSbetIjTOK91nE7Rvu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1196 firefox_plus.exe -
Loads dropped DLL 4 IoCs
pid Process 1196 firefox_plus.exe 1196 firefox_plus.exe 1196 firefox_plus.exe 1196 firefox_plus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefox_plus.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023638-2.dat nsis_installer_1 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{24588FA4-10F1-41D7-B19D-6E22361E47FA}" b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\SearchScopes\{24588FA4-10F1-41D7-B19D-6E22361E47FA} b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{24588FA4-10F1-41D7-B19D-6E22361E47FA}\Codepage = "65001" b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{24588FA4-10F1-41D7-B19D-6E22361E47FA}\DisplayName = "°Ù¶È" b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{24588FA4-10F1-41D7-B19D-6E22361E47FA}\URL = "http://www.baidu.com/s?wd={searchTerms}&tn=site888_1_pg&cl=3&ie=utf-8" b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\SearchScopes b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1196 firefox_plus.exe 1196 firefox_plus.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3132 wrote to memory of 1196 3132 b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe 93 PID 3132 wrote to memory of 1196 3132 b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe 93 PID 3132 wrote to memory of 1196 3132 b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\nsk5271.tmp\firefox_plus.exeC:\Users\Admin\AppData\Local\Temp\nsk5271.tmp\firefox_plus.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3824,i,6510295916244954942,10164894160290787457,262144 --variations-seed-version --mojo-platform-channel-handle=4400 /prefetch:81⤵PID:4864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD530c96ef06b2d89ce7f32a0ab7e85017c
SHA15736361779aee705764d1b0bb8eb8a2f4c45da33
SHA256e8513c2d35e821298b91e3226089ac66ab75e44c4c5afd436bac6f290e3fe843
SHA512188aab49635e99831a99933dd55654dde107d7751b5612f9e27e7f2246aeedd6de0d6d8b0968fabdb253d9fb2a1745858e796bf6ac2091a6b0fd4df0142cefe1
-
Filesize
9.8MB
MD5ba26cdeb3fd7f690ee82e9845c93fc40
SHA1e68398de276f5e9af6df407c016a847543597405
SHA25679d9047bb441a2880849d8e62410d463911dac4bad88393f004f2fa01715250d
SHA5126041eb3576df60d633d91f4e10798cb4e96cb8a98172af52cdb32ab126f354a79414dfbe744102d948d467ce695eae5aeb84336ba562f66b5e62c1be94a0ec54
-
Filesize
12KB
MD508c82a46416a5e2b471d457968f53816
SHA13e3897c20b9e89b279b4764a633f67955bf8f09a
SHA256435baf3b7282c9110697a4916834ef9371dd29fae6b4cb8e19c19eb126562dc9
SHA51291e2055b91d04b2348a923cb298ac6ba3637de5038dc4f849c4d2f1665d17de9cd6eb6a97d42d0f894d65348c8fd8e79cd61b667ea5a78e8960347e8cc8db81d
-
Filesize
10KB
MD561151aff8c92ca17b3fab51ce1ca7156
SHA168a02015863c2877a20c27da45704028dbaa7eff
SHA256af15ef6479e5ac5752d139d1c477ec02def9077df897dadc8297005b3fc4999d
SHA5124f5c943b7058910dc635bdcfadfea1d369c3d645239d1a52b030c21f43aac8e76549e52fd28e38ba5341d32aefe3c090dd8377d9e105ad77f71ab8870d8e326e
-
Filesize
630B
MD5572fe2379712f8010a2d09d69797e74d
SHA1c83163952edcb19ea9e9de7aee7418edfd327eb4
SHA256ea52e8703194620a55634c1b733edbeb5f180815d3f4a07557220bf2ab1a21e2
SHA512a3aa6dce15c2a0e763e702109cf263840066aab08c34d55d1361049a4f0201b3235f23d00d57e6ba9afa94d391f99b5ee5554090c621cee85c9ae5ccbdc9f400