Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3be23ca84c7...18.exe
windows7-x64
7be23ca84c7...18.exe
windows10-2004-x64
7$PLUGINSDIR/InetC.dll
windows7-x64
3$PLUGINSDIR/InetC.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...om.dll
windows7-x64
3$PLUGINSDI...om.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ON.dll
windows7-x64
3$PLUGINSDI...ON.dll
windows10-2004-x64
3$PLUGINSDI...Js.dll
windows7-x64
3$PLUGINSDI...Js.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDIR/nsZip.dll
windows7-x64
3$PLUGINSDIR/nsZip.dll
windows10-2004-x64
3Chrome/CT1...yer.js
windows7-x64
3Chrome/CT1...yer.js
windows10-2004-x64
3Chrome/CT1...ack.js
windows7-x64
3Chrome/CT1...ack.js
windows10-2004-x64
3Chrome/CT1...ont.js
windows7-x64
3Chrome/CT1...ont.js
windows10-2004-x64
3Chrome/CT1...ger.js
windows7-x64
3Chrome/CT1...ger.js
windows10-2004-x64
3Chrome/CT1...ete.js
windows7-x64
3Chrome/CT1...ete.js
windows10-2004-x64
3Chrome/CT1...ion.js
windows7-x64
3Chrome/CT1...ion.js
windows10-2004-x64
3Chrome/CT1...g.html
windows7-x64
3Chrome/CT1...g.html
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 07:27
Static task
static1
Behavioral task
behavioral1
Sample
be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InetC.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InetC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsCRandom.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsCRandom.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsJSON.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsJSON.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsPrefsJs.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsPrefsJs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsUtils.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsUtils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsZip.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsZip.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Chrome/CT1060933/content/AbstractionLayer.js
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
Chrome/CT1060933/content/AbstractionLayer.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Chrome/CT1060933/content/AbstractionLayerBack.js
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
Chrome/CT1060933/content/AbstractionLayerBack.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Chrome/CT1060933/content/AbstractionLayerFront.js
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
Chrome/CT1060933/content/AbstractionLayerFront.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Chrome/CT1060933/content/BrowserContextMenuManager.js
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Chrome/CT1060933/content/BrowserContextMenuManager.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Chrome/CT1060933/content/logic/autoComplete.js
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
Chrome/CT1060933/content/logic/autoComplete.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Chrome/CT1060933/content/logic/priceGongMigration.js
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Chrome/CT1060933/content/logic/priceGongMigration.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Chrome/CT1060933/content/logic/uninstall/dialog/MozillaRetentionDialog.html
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
Chrome/CT1060933/content/logic/uninstall/dialog/MozillaRetentionDialog.html
Resource
win10v2004-20240802-en
General
-
Target
be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe
-
Size
2.8MB
-
MD5
be23ca84c770caba266a752ef659fbe2
-
SHA1
24f070cc1050901e56da6e8ce30a9fc51979c789
-
SHA256
0608199328a6a99f873f7ac2b24e3dae6360b7eb6d2126f65b9571fc20437c24
-
SHA512
a2bb0b83699b26e8afeabee1fbc9d95123584cd21aeeb5dcaca3b0bf7356cf437b2e80767f4359d0ae23dc056237d6cbb330ea28031e0100ab978891246f07d1
-
SSDEEP
49152:g7OKtQuwOTN2nuqnKZ1UFxalg+q7tlb4Wd2/FRZxY2wdHqfcxtVgq:gvaujeuiK+2Xq3b4Wk8PdH6cx
Malware Config
Signatures
-
Loads dropped DLL 11 IoCs
pid Process 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe Token: SeDebugPrivilege 2220 be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\be23ca84c770caba266a752ef659fbe2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5ebf9a4b9b5866532fd4ddbb996b7e49b
SHA121b4893a07b1c3f5360db4f2b38c9e41f5e3745e
SHA25685bf0210dc38073ca5a8ce2d9fd6379c9861c9402d0992f57c1b6df543412e17
SHA51224561917683005a24a5b9d259940054150aebda894538bcb4a312a72e7246b4537c66b19477cadd8314fff520a985001cccd260ebc315a89cf1a2fea54d1d902
-
Filesize
307B
MD5571ac6052902d3f4b7a74f155dbf062c
SHA100989f579b361b5b3c2e4486d093db4afe79d203
SHA2564f66463e5b2324b27f4ab9ebcfb12642bf93da09a64898c942b9a7e7961debab
SHA512dd2ce26ecf079a68acf4f7df217b1566478d9661d84eb79da07034868cf997ea7fc7c129e5eebf13718a1ee3fa6820b23eafb7a849df5a8b79eab529a3942bd8
-
Filesize
613B
MD54660513d2a9ac853b1e122e743c17bc0
SHA1f8cfd1fd8af967abda0e9fcb7d007f2fb42247f5
SHA25665b55f4d1d165e131425547c6509bb462d78ecc16d7d9287b5952cfa5407f864
SHA5127d02e11e645a2222975383dc6b67701f7df3892f0dc4f049d8039fb29abd3fab4ef12118a4c3a55893afc2a43dcbd1c7be18c175d58ee64c3a76030fb98626be
-
Filesize
124B
MD5906e328a272dace63cd229f81934b863
SHA122708029bbb82c6b58c4f2fde3197765daef96c3
SHA256352630ea6cc2822a635671eb47f399772af66f6ee22c5e8feb0d0e8040b80c4e
SHA5127ac8597e8740433753ffab90a44946dc4d9fbce7e022debbbf6f1a2575fbab525c65c089a0c06c1c198402243621b6850b7cd911a66beda2bc82255339a178eb
-
Filesize
256B
MD5fc66e267ff146860bed66b26a56c5f33
SHA1cf969c3ce3b27e2b22d9762688312e22edf6b31e
SHA256a3a2f47c3773ba7567228c2df682c51276db3f00e81c40f3bb8e5550e141faa5
SHA5120ebc9c413047df3be5be9adc539de42e33e2a858b23c1b74f6e7aaec73d1db67b42378b5c617edd83799f68a909e67f40f22087dc95f479ef2eecebe52fed9ea
-
Filesize
290B
MD505ee2a80b6769897b2bb05637a12985f
SHA10fd3321f9cabe161b38570b58ef8970684c85708
SHA2561cd72f02df8d0b7670cbc3880d5a032ff5a0b8dcd3c04dd2fa97914df4e2b6eb
SHA512395a3039f2e8e126bf69cb097a426bdab059d55d7e627725be853c34b90256a52448c740595605e4b26897ce9b59473bf987cd8b5e61fd4098edb7db50cb4a5c
-
Filesize
509B
MD5347de497d9671f8d6303d45a3c361cb4
SHA1ee75136a473a94a0efaceb4a729017a549d93dbc
SHA2566457bc3e0b7c73b3eda659fbf88b573f5fa585c3e296b00d27912386ea4464bf
SHA512213bea33455a4a23765a233c5b3d1fe087dbd6dbd3c12f607dfee92e34450af119976099f32d9c86b88691e532f20daa84a85a294e9e2572f6cd5b5bf4b3ba79
-
Filesize
569B
MD550a64abda79ec84d0a48c6ca44f03c65
SHA18fb70acfefde3815880682ee5d4065dbc39c519c
SHA2565f4086f2b7aafdeee0ca5abf4e6d2d7089cf999cbd929d936d07de3f9d1bcaec
SHA512430c7f3a0227372f3afebc1e0cd8d1ca5379fc727918bf652c6efb707ee83f913eac5d44c958bf20c931362201ea93e8514f3a6ba113f11a50e3c0c56d2235d8
-
Filesize
660B
MD5f02628024ce7de7ad81fd660c7011eca
SHA1a9e8255022055027f9fed21648f2deeb1d2d4dff
SHA2560d8dda868caa123314424545cd52f37ab285684b858efec2dd63920f5af4d962
SHA5126c930c53eb78388f98d6649e19375f9da1bfe8fbbb942bcdb123c8988c229629665af3e104e544c1098cc93da8721bf2ceebb760353f71f0874182a594c20b33
-
Filesize
848B
MD5ac4ac26cab77f4074c2a6b3fdd6755b5
SHA1344794bfa0da4987539f973d81a09c4facc14a3e
SHA256a8b535978de9e1c331a8b131cb60a72459265f8ab850693e29880f88d4c4f03e
SHA512c1ff4932477e9a822f5e7aae0bd8c568b383fc780f7882d7d33bc5677c04bb01531c986a03028017bc24515bdd0b5e19489f2a0856c62dd9a849d513376574dd
-
Filesize
442B
MD5dc1996085e0c9c6f28ddb5585af20902
SHA14c64a8c7a83822696f752fbcd5f2ec9098c32ec6
SHA2561b00389f4035520ec015a517529abc98980efc9d8006a1d77f9c07e16bc7ceaf
SHA5128652ae97ff002c048f4fd846fac9720dc8fa42ad41764f4654675d821867511bd8b78a1b24620c565fab55613f1bdb87e63030d0ca331b7309b01b4e66ed5b66
-
Filesize
708B
MD52ab493beb950e4b9e8af190e6dc135e2
SHA15657f14c4e35a23308245e622a9e71dfb56153a6
SHA256bc324aabed42ad31501cfbeee1abddd16f91536c9ca805694f93a4abdec46784
SHA512bb32a7fcb8363ca71a1a3becab4f6637b850f870c55bb7a9c352f8014bbc6805ca0c30d6916f0ae4e4735b77cec69e4f83684485b71b5471e7bd1c4671cd0496
-
Filesize
753B
MD5d1bd3f54f8a7faafc87190960be82536
SHA13492155fdb6ab1f5d89abbc299e26d8d451de697
SHA256800848c9298e1982260a5fb0509d84d20e0a52292d69789340f36601ae4e5308
SHA512f0e6d11e3f99d1379142c6f51b736c0221dda421d542719bd029a0491aafbb4c9158eba188605569f6c63ed1e752ba92d8e73d55e07b87dfc34ea645dd3dfab7
-
Filesize
23KB
MD57760daf1b6a7f13f06b25b5a09137ca1
SHA1cc5a98ea3aa582de5428c819731e1faeccfcf33a
SHA2565233110ed8e95a4a1042f57d9b2dc72bc253e8cb5282437637a51e4e9fcb9079
SHA512d038bea292ffa2f2f44c85305350645d504be5c45a9d1b30db6d9708bfac27e2ff1e41a76c844d9231d465f31d502a5313dfded6309326d6dfbe30e51a76fdb5
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
145KB
MD59ad78702635cd2f0ed3433628454fecd
SHA1c786a3cb7ff21214c04299ffc37e4f9852afe6bb
SHA256673d8ffba022c8196129d537973ad18049192f5cdeffd027ee743e2a6f7e1c85
SHA5121a15155057cece9e5600e3a446a7f25a91c7caff8b99ac995566cff18edde956789a2c549748aa267802111137fb5fb60e2aafa077caf06df060361274745398
-
Filesize
87KB
MD5bedcf010d3e92c6cbc30fb8ea67abe1f
SHA14cc451f8d84913cfbaca0286f4b415c841221d4b
SHA25650094ae30fd6c741ae051c2d6d09a0af957caf5d48fa96f232f9279e7ded2103
SHA5128394b57aa401767f259f2ba14ddc17e4ac022f7e6f392d790e3466b0a2801a210a71182abaf6cc5fc8d160ef79ba20b27930dc33763b9db497293e52ca52f38d
-
Filesize
169KB
MD5947cf03bd51a4644cb8e59221485343e
SHA14edb9082cda4834f3b08a501e75e21a430197dca
SHA25623e4665fa2ac4434aa623b8818d478fd7e30b3a9fcb7ee43027b4c1771082ef1
SHA5126fad92247cbfdf623446f2b06671888d71f1cb23521e6de0fffb9fb56663d51e38946eb2958c2b5462f5bbb5ec999a6ab5ce5b0d46005b82f065863b187d8239
-
Filesize
340KB
MD5e34567b8e1dccb066ccd0173d5818498
SHA13ce6f07c3c06bb89d6b422062cff9dc66f13f856
SHA256ffd585c14f96f869f3c3ce6d0a2d47bc0a2575c02bde9d4057bf7fa5fa81c6aa
SHA512dcac041914f7ebaa96ced5672752726709155bb8f8709f2ec215e66de7163e2496f3d73a5c9ef431668f814b633182012f728f099771462a8558e34acc3498c4
-
Filesize
196KB
MD5977d7686d7a04135444542fdc1e7c13a
SHA1a171f9ef1eb96ca91225ea26468c1023939a5c14
SHA2564274ea4a094ebb9eb54046c95488460afb0097d0565b8eae4fbfce981706f0cd
SHA5124f3bef13aa1d1f57624385dfaccc4ecce201c235ba2d2d451f469d39ef5285afdd57249c7dc5a6538253ea8f7cda25964abc1eb041715730d2626694667ee4f5