Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 02:54
Static task
static1
Behavioral task
behavioral1
Sample
118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe
-
Size
1018KB
-
MD5
118a5583abe12d104472c7f79cdef960
-
SHA1
18e4a85487504735eb24900c1f752ac3ee3dec72
-
SHA256
2e980431a3a092c619584ae6aa1015aacc16601d79ca2373f7d6a1568c5ada14
-
SHA512
19e6b3daa077fb1d4baed31811cb39145735f0732371df1cbdb9f2cae4fce6914d0248156fee01ea9c87f91f1a113ecc8e8b74b812b3df63fa2298270fba62fd
-
SSDEEP
24576:nBR3JS2l7sit4dSGa7ggzu7CQjcmi+QnTN3vJxdjpaD:BBJS2xsi7Ga7YCQjcmifnTlv5jE
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2408 hpet.exe 2972 utiC439.tmp.exe 700 hao123.1.0.0.1104.exe -
Loads dropped DLL 14 IoCs
pid Process 2376 118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe 2376 118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe 2376 118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe 2376 118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe 2376 118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe 2376 118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe 2376 118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe 2376 118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe 2376 118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe 2972 utiC439.tmp.exe 2972 utiC439.tmp.exe 2972 utiC439.tmp.exe 2972 utiC439.tmp.exe 2972 utiC439.tmp.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/files/0x0008000000016c53-16.dat upx behavioral1/memory/2972-36-0x0000000000400000-0x00000000005C1000-memory.dmp upx behavioral1/memory/2972-98-0x0000000000400000-0x00000000005C1000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utiC439.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hao123.1.0.0.1104.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main utiC439.tmp.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://br.hao123.com/?tn=4shared_hp_hao123_br" utiC439.tmp.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2408 hpet.exe 2972 utiC439.tmp.exe 2972 utiC439.tmp.exe 700 hao123.1.0.0.1104.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2376 118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2408 2376 118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2408 2376 118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2408 2376 118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2408 2376 118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2972 2376 118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe 33 PID 2376 wrote to memory of 2972 2376 118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe 33 PID 2376 wrote to memory of 2972 2376 118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe 33 PID 2376 wrote to memory of 2972 2376 118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe 33 PID 2972 wrote to memory of 700 2972 utiC439.tmp.exe 35 PID 2972 wrote to memory of 700 2972 utiC439.tmp.exe 35 PID 2972 wrote to memory of 700 2972 utiC439.tmp.exe 35 PID 2972 wrote to memory of 700 2972 utiC439.tmp.exe 35 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21 PID 700 wrote to memory of 1216 700 hao123.1.0.0.1104.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\118a5583abe12d104472c7f79cdef960_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Roaming\B1Toolbar\hpet.exe"C:\Users\Admin\AppData\Roaming\B1Toolbar\hpet.exe" -home -home2 -et -channel 1679913⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\utiC439.tmp.exe"C:\Users\Admin\AppData\Local\Temp\utiC439.tmp.exe" /S /noeula3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Roaming\baidu\hao123-br\hao123.1.0.0.1104.exefirst_exec_from_inst4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:700
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5ca84528d353ea92dd4c10bb5cb0e7252
SHA15846c7b4b2190921609a24834e8a004fc279ca72
SHA25689a4b773c91f3874c3c804f4144bd300dfead6e457be7fdca72d88273af9e0e1
SHA5126e7597079c98c9a49fc763c32364d85e2807e7cd73d2245fa1f558f0d2bb9793c8a298eb6734fe793fb6e95f33c3721d1f609c4937c7fa500a0a6663fbeced36
-
Filesize
944B
MD53e2125a28970c71c1160beec42ea2033
SHA1d944bfd18a54a93ac2bd0ee576c362fe9a497e62
SHA256195d562b874bb67ec354fc0c41c10e71efe39fb9f1cac02436a342c0df4539ae
SHA5121720246b5e3e65a0a42a67e4d3a465235d7ebe83c79457f39a3bd91bf9099be5094585184f3c154184ca09422ce56ed7f2d5a7520ce6567111431db94ab5177c
-
Filesize
808KB
MD5c2071b37c94a0fd8ff0ecc17d17f9583
SHA137ca74ef0594fae3bca1c37fb4df19e1130c2c18
SHA2561b278f89309b77d0ad4eaa51a759311fbed941afcd36b709c91636c4dd916642
SHA512a451de504b91326bd0487740f0de347184a8ac38936922e5fbaab114fa17934f31de8c5ecafe5a9f98f25bb2f18e02121893ad9454f8ab38d25619495424c82c
-
Filesize
1KB
MD573d5a353db127df0aede4efe1e53098b
SHA1cda156cfaeefcc598e5eeeaf716bb933d27a3df7
SHA2562d2e92e3210e20f62b8d1ecb5a0b3a87949ba3821be069bb4092f02e5725c1b4
SHA5129d4f9f553d9d73118ebefb9fb37069748ba2d4a1f28523ac479e374777398e9a2c47f6114aa50602912932f6a61feccde65f172b07664bbcfdc9fd30bed60a38
-
Filesize
341KB
MD572090258195e1dd0d6c49a314c745d0d
SHA1604c69e4b22a95cb711306fac6c83796bea1309e
SHA25681502e7f7be3941c4383f104b2a30377a5a50c0baf6b5449a329a3706ae3fc39
SHA5129baeb85154db459cc8807a47accc927ccfd915cfd8c1f78870e37ac6da9cb89723610edff3c8932f46f48c61e57f2b774a9084c43471467b16969c48a9535f7a
-
Filesize
467KB
MD597bc7c2a98ee92297fcb2cecf1b222f9
SHA1b3e08065fff002513c36cfe85e0ca607c68fbce3
SHA2560effc6288b6ce1f933c8b97dc8ec5e6ee883f0628bea176538f65b0b2297d1fe
SHA512a53e1220dfba16fe44f20bfc32dd986054751fb124a1c0917af4c34a45e7a2187ae05098a7681f9ed65cee852e3fbecf8fa49cc015b224dc50566659859986cc