Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 08:02

General

  • Target

    16d88e8323fa362cd5a1473578c46f6f_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    16d88e8323fa362cd5a1473578c46f6f

  • SHA1

    f274f3a8dde5bc4385702c8040a351c12d0dd461

  • SHA256

    ee31b012b2e7d0a20115ebbdca5eb93741c6247ac984743e9b133cc79de2bca4

  • SHA512

    befaac12a62591eacfe66c438005ab9ddfcd781217d17655685a08f08507a7fe95c28e364e3cbb47e0b47f95e5ac62333b6592e04e3c4e5942cecb1835b7f35d

  • SSDEEP

    49152:k0jK9+LZgR8B2dWBCp1pSei2EY48esWo/I0p6eJhvImKebA5rOYiZno:xj+u2+20BCzpziMR+f0pJhvImKebSivK

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 6 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 24 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16d88e8323fa362cd5a1473578c46f6f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\16d88e8323fa362cd5a1473578c46f6f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Users\Admin\AppData\Local\Temp\is-G5BUF.tmp\16d88e8323fa362cd5a1473578c46f6f_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-G5BUF.tmp\16d88e8323fa362cd5a1473578c46f6f_JaffaCakes118.tmp" /SL5="$400EE,1643093,70144,C:\Users\Admin\AppData\Local\Temp\16d88e8323fa362cd5a1473578c46f6f_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Program Files (x86)\Inbox Toolbar\Inbox.exe
        "C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /regserver
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:2592
      • C:\Program Files (x86)\Inbox Toolbar\Inbox.exe
        "C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /install
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        PID:2500
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Inbox Toolbar\Inbox.dll"
        3⤵
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:824
      • C:\Windows\system32\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Inbox Toolbar\Inbox64.dll"
        3⤵
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:2284
      • C:\Program Files (x86)\Inbox Toolbar\Inbox.exe
        "C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /afterinstall
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        PID:2376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Inbox Toolbar\Buttons\black_brown.xml

    Filesize

    50KB

    MD5

    9db9a8baf643a3512feb2f1014782c72

    SHA1

    04538d23239e716694e5ea17f7bb9132aa0e3939

    SHA256

    82f18d65fae1ab1f78afabc7d44cf3725b4a65c93d21d40d776ef69762310f41

    SHA512

    612d7348882a6d0f1ddc86228556bee42e555143ee9ca78000a52d01e764078c80d205796eb9de39e903a35a84b12abf69e4bf4bfb4976396ab1109c34812a36

  • C:\Program Files (x86)\Inbox Toolbar\Buttons\general_youtube2.xml

    Filesize

    5KB

    MD5

    9d25e413b26edd6157f92e120941a856

    SHA1

    97bfd31d3282cc568e74f8f8b86a3b59f32d36e9

    SHA256

    694696a703a7e7e27d4da7d7350c6d2eb1cdf3d4494ce523290d94e322436c08

    SHA512

    481416e4de97faa516d2f3f6a34f2a5a6a9c11f12365e07c712799a9f5e549fc05d1a54a0d46e72eb7c1a1525540bbe8f1e851cf8ef486808e43d77673bae056

  • C:\Program Files (x86)\Inbox Toolbar\Buttons\pinterest_button.xml

    Filesize

    5KB

    MD5

    5edb9f1e0f48304c7e7ac837a54a12d4

    SHA1

    3380c2b399018cec277fb5111cb2b8dec5868815

    SHA256

    ad88c981ad1cfad58e72b60dfb9d4357c1337e3b32e81d80c665d3e3a9d60405

    SHA512

    15c4ab8e80458e5684d2ca9e41f518cbeb48cf8d783e9b75ac0925098f52f4ccec4833f0f8513c40d5330804629b57bc970edcedbcaee168efc8c6a04b585397

  • C:\Program Files (x86)\Inbox Toolbar\Buttons\social_facebook_panel.xml

    Filesize

    4KB

    MD5

    bc28784f4872f3d8a38c058825ecdfd2

    SHA1

    96f0a1631f4cc51fc71faf3bca0dc27ca971ae23

    SHA256

    6ffb7375b67cacff0a5c4a83bde7b958fb039f2f87344ea4b2a455828f651c10

    SHA512

    6585a1055336a4406261d03e4f5239e0cc3a793394f56bd67b26c702de2eaf9bb252be52105f64ba3aad056f601b2e8ec7f811e4a35680489de9d51be7cecae0

  • C:\Program Files (x86)\Inbox Toolbar\Buttons\social_myspace.xml

    Filesize

    4KB

    MD5

    0ae22594aed7c3c0f6a2346a35070bcf

    SHA1

    4a52f1c230ce76a949aa33d473c504c430e28e42

    SHA256

    a148bafd6c429e6517c1e11156cc627aa4b4522915e9bf9503319639fe6784f6

    SHA512

    cc2a151839e7687acf48917d0b65235b0a32011e2342d6951436d84423355efc60ee6da3f83b1fcc29b2bc08cfbfe52d51227d98fda7d2af493652a3479ef90e

  • C:\Program Files (x86)\Inbox Toolbar\Buttons\social_twitter.xml

    Filesize

    7KB

    MD5

    a0670c3f05b5e4c2887c8fa619b8d265

    SHA1

    0c4f1d91cf9d72bf072ad96e24768147994c2a01

    SHA256

    690bc31e087aaa869edf7ac2ca8ecb16386464be67c257dcab8fd4d3b27703b8

    SHA512

    7317d3ca895d34afb88ef7f0a1a2e3f00c335901902bf2a4ad8397d7cb6914a27e5227d1ff63c9ffece1c28aa910813ba75525090fd0695a625baee4fe42d8c1

  • C:\Program Files (x86)\Inbox Toolbar\Inbox.dll

    Filesize

    1.0MB

    MD5

    5a5661aeb0941013365669cd88d9467e

    SHA1

    852bea09d2c0e419be8f80c82d82f369facb842e

    SHA256

    78f9b0f5fea9d1d87a01e61b96b4ed0e494564d7100b092d4385875aa40a4919

    SHA512

    c603a2da9f04994808a0e5151f53843d0a01c6ac486e5d655996f2dbb95dc4e3437471ce1a8f1537b164913942f1b6c47ba69a9b9a434073dfe18b985480148a

  • C:\Program Files (x86)\Inbox Toolbar\Inbox.ini

    Filesize

    2KB

    MD5

    4b7d7e04ac553df7aac162c657ba64e8

    SHA1

    08b4e45757c77739c32c7c9e4021a575224b8126

    SHA256

    80029b4dcbd30334c5956638fd47212e7af0d6c1d3dee4508e79be0817173176

    SHA512

    c2f4652511e2e1469be3a93910881d0f2480d3646623ce82f4f05b5ed14df0f466bfeff81a858144645ba97039a8fbfefbf4c0555cd7d0b272c878e6492ce37c

  • C:\Program Files (x86)\Inbox Toolbar\Inbox.ini

    Filesize

    2KB

    MD5

    ea020060dc8f25ea13ce1353841fc408

    SHA1

    e1bc16fd765ba496f53b3110fd7465e26403096a

    SHA256

    1d653e45e05655595f867f417fb011103faaa503e3b092774947d3c12af8c232

    SHA512

    6c52d217c8025d80c0c314dd38c4405d278d74a3bf9f8c59ebd3af938663959fee843ee6d28feeee737f51a079cd48cadc10a2790f10636dbeccefb9992291c2

  • C:\Program Files (x86)\Inbox Toolbar\Inbox64.dll

    Filesize

    1.5MB

    MD5

    0adf14e709da294adce48ab621e341af

    SHA1

    18cf3d76eccb2e62ca9cf038e75a0cbd59386d64

    SHA256

    0d0b5d6e107a916dbaf1b64f97dba9d8f32d0d6e0af28cb69c34656408e48c54

    SHA512

    ed4e4a514815632bfd9fd7fb86a54b05fc9038a3421ff0cd502110a342ccc31daa2eda06a0acf0bf74817268fbc31e50c88db20037021ea25fbb311eed256326

  • C:\Users\Admin\AppData\LocalLow\Inbox Toolbar\config.ini

    Filesize

    30B

    MD5

    6e154bd2aab28f37a3bbe8ef394802e6

    SHA1

    6efea9c0fdc55c2345369441ef19c32e182e7ce5

    SHA256

    b581ae9e6dd4f3dcf66fad7afbba62279d195b5af63a997abb342761a5acd2d0

    SHA512

    b2b8b962a63cc21b55440c38960c22f9e1c76e377244a63c737a5ac4c15d3ded143f3ebaffed74707291c4526ed9a80f9a9e5ef351b50b4f4bb08b81e92669f4

  • C:\Users\Admin\AppData\LocalLow\Inbox Toolbar\translate.ini

    Filesize

    89KB

    MD5

    6b72fbdc939dffb3c9d268d521459f91

    SHA1

    948023c34ddd35bab4b83d80cabf6b7fb06eb5f2

    SHA256

    9b1c3b8a08541289d360526f37a4647a59fa40f474d2288ea6a5c3a947364fff

    SHA512

    f8948e0cc24361f361886a4f9467b8316ed093e0def78df860ed221e345a69a8cae785f57d08cfd3ac54741ea9dbde97f035eb88aa8d35b5529c32cf50b1d8e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{C04B7D22-5AEC-4561-8F49-27F6269208F6}.ico

    Filesize

    1KB

    MD5

    34f4618666b7e80e687b25b82a7da5e2

    SHA1

    ab543a8992b71891139d608d77403a59bfabd501

    SHA256

    fa975f7a7a854a7730b1c92d1567706dce2eab80d78cf131eb1cec40e88cb7e3

    SHA512

    b7e4eeccdd9d84d9a352e9490f19d08c06c54554ac52e3ba9aa1a81de2181a6a185387a323122021303afe32da21ceb3f1f6aa3524c45a6c8d9abac4144237eb

  • C:\Users\Admin\AppData\Local\Temp\CabEB6A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarEF15.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\is-3FCGQ.tmp\RI_AfterDot.bmp

    Filesize

    84B

    MD5

    7ccd5a0af4da51cf4962f184fcf9456a

    SHA1

    de37f4521fa7fee49b37898f4136728e8971ee0f

    SHA256

    8f2374b30622dfae1fd0b9706520de34c5e1597c1531fddbff65bc0201132ac7

    SHA512

    d7c4fbc6a4413dc457400fa2e026dea5d639a5b413164cc6939284c46bb46b6ae8ff10184ba2da4f32ace89646b026400db2a49dd9894d71e88d003a91c8267a

  • C:\Users\Admin\AppData\Local\Temp\is-3FCGQ.tmp\setupcfg.ini

    Filesize

    44B

    MD5

    5753e5bb7fbc363a4ab377b73800d0a3

    SHA1

    6094bda27e5573ee704b3359bab3a9107ed5e6bf

    SHA256

    37f3e5c1039d640824e16f316145de37328a0a32e9b8c334699a3e8d98574732

    SHA512

    77d7853b1f7859ab81ead1842db4372168b47735ed8402fff6618744fd528499bf2690ef751183b64fadb6419c71f3936b16fdeb7f6f73f0ad7e2b91400a594a

  • C:\Users\Admin\AppData\Local\Temp\is-3FCGQ.tmp\tbr_dots.bmp

    Filesize

    164B

    MD5

    adc799ec79eeaef366ea4dddf099c3ae

    SHA1

    556c915615a34a2499604b7b732ab304b20fdd4e

    SHA256

    7e7f18c73560f9c020abe1ab1f22705083281e2ea16ab0030fc927901b5b5d1e

    SHA512

    76962a17cc26d3f9886828be4e43373ac530165e1c627272ed7c0bc731133e97608e55d2e31f44592aad0d0974352155f41a0718aa0666ec128406b1050c1d6c

  • \Program Files (x86)\Inbox Toolbar\Inbox.exe

    Filesize

    1.3MB

    MD5

    4b05f0216a03ad5c4e5c9b59d60aee35

    SHA1

    d1a155ce0f6ce8554f4abb640660b7cfef4b5c1c

    SHA256

    c4d778be1dbe83532cb255516fe61ef62b1360eb0179899251c93f580110f3e2

    SHA512

    85bd3294472f9983ce61c97d29a67ad8a01c50a6c215c437d7826ffe980da98f4a1aad0939890388186e5147e66867fd5e5324e708c9a8efab0a727a544c9188

  • \Users\Admin\AppData\Local\Temp\is-3FCGQ.tmp\DownLib.dll

    Filesize

    183KB

    MD5

    db25dfdd4c1f2b65c68a230881072695

    SHA1

    94cd6a3438041f0e61b0a1bea7b66461854efe69

    SHA256

    1b66aaf1e7e3c493dd96af3b7442ea60072f6e93ba45281eacd31a14ca7e7e73

    SHA512

    db69e4ab2218856e5184d9094e7e39705b83e3efdc15225067205c8faf6e5836145364f1d509192defa3b48864e72b9f8c0f2dc53a7adb2b86c655318b7afc2c

  • \Users\Admin\AppData\Local\Temp\is-3FCGQ.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-G5BUF.tmp\16d88e8323fa362cd5a1473578c46f6f_JaffaCakes118.tmp

    Filesize

    1.2MB

    MD5

    e7106fbf42fbc6d5b08a18ada4f781b4

    SHA1

    36d4a629f79d772c0b0df8bd2ae2ea09108d239d

    SHA256

    64e1f1fa7d91920b17bc7bc679a4cd8d87ff5b104318b6921bb6bf6a19055635

    SHA512

    adf876296a952aadeb4f25211c0939bf5a278809b5d3007ad7e26c5d4975e7684d242c1b3de796efd474a47cb7ecdb80f9047935924a1108bf0e4d7c973d1845

  • memory/824-234-0x0000000002220000-0x000000000232B000-memory.dmp

    Filesize

    1.0MB

  • memory/2284-237-0x0000000001EE0000-0x0000000002071000-memory.dmp

    Filesize

    1.6MB

  • memory/2376-316-0x0000000000400000-0x000000000055A000-memory.dmp

    Filesize

    1.4MB

  • memory/2376-365-0x0000000000400000-0x000000000055A000-memory.dmp

    Filesize

    1.4MB

  • memory/2500-279-0x0000000000400000-0x000000000055A000-memory.dmp

    Filesize

    1.4MB

  • memory/2500-304-0x0000000000400000-0x000000000055A000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-201-0x0000000000400000-0x000000000055A000-memory.dmp

    Filesize

    1.4MB

  • memory/2736-2-0x0000000000401000-0x000000000040D000-memory.dmp

    Filesize

    48KB

  • memory/2736-230-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2736-0-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/3004-231-0x0000000000400000-0x0000000000536000-memory.dmp

    Filesize

    1.2MB

  • memory/3004-283-0x0000000004820000-0x000000000492B000-memory.dmp

    Filesize

    1.0MB

  • memory/3004-281-0x0000000000400000-0x0000000000536000-memory.dmp

    Filesize

    1.2MB

  • memory/3004-240-0x0000000004820000-0x000000000492B000-memory.dmp

    Filesize

    1.0MB

  • memory/3004-232-0x0000000001FB0000-0x0000000001FE7000-memory.dmp

    Filesize

    220KB

  • memory/3004-22-0x0000000001FB0000-0x0000000001FE7000-memory.dmp

    Filesize

    220KB

  • memory/3004-9-0x0000000000400000-0x0000000000536000-memory.dmp

    Filesize

    1.2MB

  • memory/3004-367-0x0000000000400000-0x0000000000536000-memory.dmp

    Filesize

    1.2MB

  • memory/3004-384-0x0000000004820000-0x000000000492B000-memory.dmp

    Filesize

    1.0MB