Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 16:39 UTC

General

  • Target

    dca096179c1256a5c48cc8c186ae0220_JaffaCakes118.exe

  • Size

    987KB

  • MD5

    dca096179c1256a5c48cc8c186ae0220

  • SHA1

    3da93b69882afe8aae7ed2a3e821969b658988f5

  • SHA256

    11204b672adbb37a18c65e284229c0f15d98100c8d530d93bc2aa46913373e5c

  • SHA512

    0d4845a3c5d5593f2296b50a056313c8b8aa9cdb849a424c01be55265328599b346f130c19ef4e82fb03afbcdc7648d9a860a84da2a8b845927d830c5d379cab

  • SSDEEP

    24576:GQERRRRRRRRRRRRRRRRRRRRtbperrOUj6k7ZqC301+jTMoKF4LnRwAjfhd1KY9ae:GQERRRRRRRRRRRRRRRRRRRRtFk7ZxFj3

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Detected Nirsoft tools 8 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 5 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 4 IoCs

    Password recovery tool for various web browsers

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dca096179c1256a5c48cc8c186ae0220_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dca096179c1256a5c48cc8c186ae0220_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4536
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AidJAUGihWSEVWCSVKCFG.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AidJAUGihWSEVWCSVKCFG.exe AidJAUGihWSEVWCSVKC
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:536
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        - CmdLine Args
        3⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2072
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
          4⤵
          • Accesses Microsoft Outlook accounts
          • System Location Discovery: System Language Discovery
          PID:2320
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4256

Network

  • flag-us
    DNS
    82.177.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    82.177.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    73.144.22.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    73.144.22.2.in-addr.arpa
    IN PTR
    Response
    73.144.22.2.in-addr.arpa
    IN PTR
    a2-22-144-73deploystaticakamaitechnologiescom
  • flag-us
    DNS
    whatismyipaddress.com
    RegAsm.exe
    Remote address:
    8.8.8.8:53
    Request
    whatismyipaddress.com
    IN A
    Response
    whatismyipaddress.com
    IN A
    104.19.223.79
    whatismyipaddress.com
    IN A
    104.19.222.79
  • flag-us
    GET
    http://whatismyipaddress.com/
    RegAsm.exe
    Remote address:
    104.19.223.79:80
    Request
    GET / HTTP/1.1
    Host: whatismyipaddress.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 301 Moved Permanently
    Date: Thu, 12 Sep 2024 16:39:33 GMT
    Content-Type: text/html
    Content-Length: 167
    Connection: keep-alive
    Cache-Control: max-age=3600
    Expires: Thu, 12 Sep 2024 17:39:33 GMT
    Location: https://whatismyipaddress.com/
    Set-Cookie: __cf_bm=Al._cDFNDGvaMXNj2sGtA6YkCtTDDJeAGuk746189jk-1726159173-1.0.1.1-NqyJDJDtSO9R4v37cvx_DLm1IiarRg3WA2f96oGfsWMybMLo.3uuQ4pFnvv1hnZxKkSsBYlVf_ykaSCQuuMyjg; path=/; expires=Thu, 12-Sep-24 17:09:33 GMT; domain=.whatismyipaddress.com; HttpOnly
    X-Frame-Options: DENY
    Server: cloudflare
    CF-RAY: 8c21558f9ce879b2-LHR
    alt-svc: h3=":443"; ma=86400
  • flag-us
    GET
    https://whatismyipaddress.com/
    RegAsm.exe
    Remote address:
    104.19.223.79:443
    Request
    GET / HTTP/1.1
    Host: whatismyipaddress.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 403 Forbidden
    Date: Thu, 12 Sep 2024 16:39:33 GMT
    Content-Type: text/html; charset=UTF-8
    Transfer-Encoding: chunked
    Connection: close
    Accept-CH: Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
    Critical-CH: Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
    Cross-Origin-Embedder-Policy: require-corp
    Cross-Origin-Opener-Policy: same-origin
    Cross-Origin-Resource-Policy: same-origin
    Origin-Agent-Cluster: ?1
    Permissions-Policy: accelerometer=(),autoplay=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=()
    Referrer-Policy: same-origin
    X-Content-Options: nosniff
    cf-mitigated: challenge
    cf-chl-out: F6HZ5eBRdMq41RSWfcvtUreByfBOTuGxTsIXsBXYxtSirCqDS+qIZNAqL1OIoG36KSyE3vjn7wpVIVI+XsaMvMWpI7jKUJ7XJwr0l+nrcEm+yk/Ff6YzplPOYzMRC1raM+iCWxexf1EB1Ofqu4HCBQ==$FwIX1rDxvTi45HzW8W7FEA==
    Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
    Expires: Thu, 01 Jan 1970 00:00:01 GMT
    Set-Cookie: __cf_bm=KSwh4tb4kd3MW2XBxj3j8M7F5E3XVwZJu1NGjdTzzak-1726159173-1.0.1.1-frNIUZZOgQYT2oE_1N3RGQb5T57Po.BBiur1nW41ab6ADAaBAUzr8ZGsc7Qbjng00WvNNUt7mbTXV3.xPf9UzA; path=/; expires=Thu, 12-Sep-24 17:09:33 GMT; domain=.whatismyipaddress.com; HttpOnly; Secure
    X-Frame-Options: DENY
    Server: cloudflare
    CF-RAY: 8c215590af8bcd5f-LHR
    alt-svc: h3=":443"; ma=86400
  • flag-us
    DNS
    43.58.199.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    43.58.199.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    79.223.19.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    79.223.19.104.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    cpanel088.unihost.com
    RegAsm.exe
    Remote address:
    8.8.8.8:53
    Request
    cpanel088.unihost.com
    IN A
    Response
  • flag-us
    DNS
    cpanel088.unihost.com
    RegAsm.exe
    Remote address:
    8.8.8.8:53
    Request
    cpanel088.unihost.com
    IN A
    Response
  • flag-us
    DNS
    86.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    86.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    206.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    206.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    107.12.20.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    107.12.20.2.in-addr.arpa
    IN PTR
    Response
    107.12.20.2.in-addr.arpa
    IN PTR
    a2-20-12-107deploystaticakamaitechnologiescom
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    19.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    19.229.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    81.144.22.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    81.144.22.2.in-addr.arpa
    IN PTR
    Response
    81.144.22.2.in-addr.arpa
    IN PTR
    a2-22-144-81deploystaticakamaitechnologiescom
  • flag-us
    DNS
    88.16.208.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    88.16.208.104.in-addr.arpa
    IN PTR
    Response
  • 104.19.223.79:80
    http://whatismyipaddress.com/
    http
    RegAsm.exe
    347 B
    951 B
    6
    4

    HTTP Request

    GET http://whatismyipaddress.com/

    HTTP Response

    301
  • 104.19.223.79:443
    https://whatismyipaddress.com/
    tls, http
    RegAsm.exe
    1.2kB
    22.9kB
    19
    29

    HTTP Request

    GET https://whatismyipaddress.com/

    HTTP Response

    403
  • 8.8.8.8:53
    82.177.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    82.177.190.20.in-addr.arpa

  • 8.8.8.8:53
    73.144.22.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    73.144.22.2.in-addr.arpa

  • 8.8.8.8:53
    whatismyipaddress.com
    dns
    RegAsm.exe
    67 B
    99 B
    1
    1

    DNS Request

    whatismyipaddress.com

    DNS Response

    104.19.223.79
    104.19.222.79

  • 8.8.8.8:53
    43.58.199.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    43.58.199.20.in-addr.arpa

  • 8.8.8.8:53
    79.223.19.104.in-addr.arpa
    dns
    72 B
    134 B
    1
    1

    DNS Request

    79.223.19.104.in-addr.arpa

  • 8.8.8.8:53
    cpanel088.unihost.com
    dns
    RegAsm.exe
    67 B
    126 B
    1
    1

    DNS Request

    cpanel088.unihost.com

  • 8.8.8.8:53
    cpanel088.unihost.com
    dns
    RegAsm.exe
    67 B
    126 B
    1
    1

    DNS Request

    cpanel088.unihost.com

  • 8.8.8.8:53
    86.23.85.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    86.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    206.23.85.13.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    206.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    107.12.20.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    107.12.20.2.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    19.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    19.229.111.52.in-addr.arpa

  • 8.8.8.8:53
    81.144.22.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    81.144.22.2.in-addr.arpa

  • 8.8.8.8:53
    88.16.208.104.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    88.16.208.104.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AidJAUGihWSEVWCSVKC

    Filesize

    38KB

    MD5

    fb24b579d371ed3c89cf6e3c01d6e82b

    SHA1

    2c21b042b1d19bfd01751d1c8570f82219c77c33

    SHA256

    4d994a19e4c8b7d9b576cca3901df19a19e56a24f345b0008bb6771b3e22f825

    SHA512

    9fc7bfe82d7a8aa13da3e93babf2c585774a6eb1dc02ab224a9119455e9371c65020d8933901656fd074d7c1f0f3ec28439b386a0210e636db84879641650036

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AidJAUGihWSEVWCSVKCFG.exe

    Filesize

    732KB

    MD5

    71d8f6d5dc35517275bc38ebcc815f9f

    SHA1

    cae4e8c730de5a01d30aabeb3e5cb2136090ed8d

    SHA256

    fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b

    SHA512

    4826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TASCWONdXMYV

    Filesize

    502KB

    MD5

    1d76cd88adbd489631f623e786b7bedf

    SHA1

    d41d2bb250f8f40637454c06bc1f4ce96591a890

    SHA256

    8c9dee8faa9bc2d02e1f89ca07c3173635968e98796c44f443b4ec420b39a019

    SHA512

    a6e181b707288bfe636b707f3ca717198f047e2285b648517fe6a77eaed50150544edaeaea653a0e04c25a6bfbb9ba008b4e4f9194c2ba6466563a79504b3168

  • C:\Users\Admin\AppData\Local\Temp\holderwb.txt

    Filesize

    3KB

    MD5

    f94dc819ca773f1e3cb27abbc9e7fa27

    SHA1

    9a7700efadc5ea09ab288544ef1e3cd876255086

    SHA256

    a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92

    SHA512

    72a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196

  • memory/536-17-0x0000000003B50000-0x0000000003B51000-memory.dmp

    Filesize

    4KB

  • memory/2072-36-0x0000000074E70000-0x0000000075421000-memory.dmp

    Filesize

    5.7MB

  • memory/2072-35-0x0000000074E72000-0x0000000074E73000-memory.dmp

    Filesize

    4KB

  • memory/2072-25-0x0000000074E70000-0x0000000075421000-memory.dmp

    Filesize

    5.7MB

  • memory/2072-26-0x0000000074E70000-0x0000000075421000-memory.dmp

    Filesize

    5.7MB

  • memory/2072-24-0x0000000074E70000-0x0000000075421000-memory.dmp

    Filesize

    5.7MB

  • memory/2072-18-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/2072-23-0x0000000074E72000-0x0000000074E73000-memory.dmp

    Filesize

    4KB

  • memory/2320-29-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2320-34-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2320-33-0x0000000000420000-0x00000000004E9000-memory.dmp

    Filesize

    804KB

  • memory/2320-32-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2320-31-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4256-37-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/4256-38-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/4256-45-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.