Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 14:07

General

  • Target

    0b0ac9c2e5e7dd24e5255a01926fbcca_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    0b0ac9c2e5e7dd24e5255a01926fbcca

  • SHA1

    32f581394e2287a802e38b5993bdc20eb0ca0f2d

  • SHA256

    89c7b7c161f5a7b5e7a43aac1bc0853628850682230a28ad55a4b739ee0966a8

  • SHA512

    3bc01a71be63489e51925cdcd4fe416a6a032af467039aa37cbc0c4417e7cc5554b741c22bfb021bf1bf6e767627ccb62f6544c3e583a554ec72ed723f30bba5

  • SSDEEP

    24576:frJKUK/juqkncxnfS//2oYP+ENxuIW/Rjl/lVlP64htKQtsVELVDiicYQRebMyHz:f1Kb/juqgcxfSE+HIuRjl/lVlP64htKB

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b0ac9c2e5e7dd24e5255a01926fbcca_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0b0ac9c2e5e7dd24e5255a01926fbcca_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Users\Admin\AppData\Local\Temp\crpD5A8.exe
      /S /notray
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2552
    • C:\Users\Admin\AppData\Roaming\B1Toolbar\hpet.exe
      -home -home2 -hie -hff -hgc -spff -et -channel 162341
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Suspicious behavior: EnumeratesProcesses
      PID:1712
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.4shared.com/file/9q0PlJOb/Finder-CWM.html?ref=downloadhelpererror
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6af8ce476e1b8a1292d1ca6d4977cf6b

    SHA1

    caa30782931e81c4e574e77d484a62e110985917

    SHA256

    a355c87a26d1703dcd6714d860eaf31e7c882e4dbb4fd770083a2e816581ca64

    SHA512

    e15d25ab3e8c174663160957ff9041617ca4407e04aa40a01dd5b58c9b7ecbdbe922c9fc1bf12806864e4291370b5577e0c3ce6c747cb2a1af249a2dab63abe8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee86dd8a9758a3a77855062f9d7b90b0

    SHA1

    4ee43ef38d37473edb6f034d3b3f2fc7b5a832e5

    SHA256

    6c69aa61ed13df1c91a10481afe1e062e1d2c244be67da0a71a4e8c5d53ac334

    SHA512

    8962a6539ccaabe58f446a8833b92c3a6d9443c7d0e62b153ba98fd79aeec746f972bacfa8a211337d1345d2a35e091d9f8400534eeab03fe3e241f97dd678fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d6eac0db87ac099460176c3cd120b9a

    SHA1

    1aa8dffb3a1f34c4bb7fa06a9d90613f089967f5

    SHA256

    6d55a7947e5e64e61ef60de445683cb00279961dc1e1b92d76dc31dce43d7fd8

    SHA512

    1095cbc7f7510bba968fbefee25c5476fc63666871362a6001b6d2baef9e2bb6f2ad5490c7a608c71bd67c889036c34606940c13f6390e36a38b155c6e0b4e71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e364eafd6bf6753a82da69d859fab2fe

    SHA1

    a84df03fd85c2d1a1d288f0cd49a7349f7deef7e

    SHA256

    59a7b811183e539e18d23282a9d886e9b8772cb21bf11d69010fbbf7a8cd1d1b

    SHA512

    e959be7cb0208c9035018553f4b771c5c331563fa3ab246d24bebd3fa03b976b062236872b7214fe35a776c66f5132f0b3a408976faabb2dea98434df6eb6b00

  • C:\Users\Admin\AppData\Local\Temp\Cab1D6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2B7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\P3O7EHAF.txt

    Filesize

    71B

    MD5

    b9719882f64b508f5ec3c0be9cd6c359

    SHA1

    12388312f25b2a34f2c83029a88c52b9bf5ccf4c

    SHA256

    1f7f16bf8af6f2e270f73cc85d0adba138bd86d0e3e81cd59f835d821bbf51e8

    SHA512

    e70a3b7cd6e103ca77577e587bb9d167eae3e2a35a7e02cb0f0894570011f79a3dddfec2ab398689f2b721c6f252a241cf7a3c6802ccd3abeaf0a5b6b601f5c7

  • \Users\Admin\AppData\Local\Temp\crpD5A8.exe

    Filesize

    806KB

    MD5

    661cf9c90eb099fb7b6a394dd8cde2e4

    SHA1

    3704e119ea16a3c336f63dc808176a22fbb8582a

    SHA256

    1570e0efe0cb98623913d942cf40f2eb5b10458f49842097125c6d6d8604cd07

    SHA512

    13c26a514c2022a10b42566a527ef98adaaa9932ffd07612ccdeb371888c037be3b429c956ecb7705699a2b6e3463758735332c9e26ea5f4493a91f30dfb4761

  • \Users\Admin\AppData\Roaming\B1Toolbar\hpet.exe

    Filesize

    331KB

    MD5

    a3e93460c26e27a69594dc44eb58e678

    SHA1

    a615a8a12aa4e01c2197f4f0d78605a75979a048

    SHA256

    3a81cefbc928fe136056257b8b57733164f2d1fa9d944dc02897b31b171335c6

    SHA512

    39d17b7190f3ff5b3bc3170c8e21d7bba5c32c0f55bd372af2e848ff1ef1392083218a562f3361fdc2db95e4133a19c4ec1cab3e982174d76b8276358dac6530