Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 09:01

General

  • Target

    17096d9515845d24ca55bd5f87de48e9_JaffaCakes118.exe

  • Size

    252KB

  • MD5

    17096d9515845d24ca55bd5f87de48e9

  • SHA1

    dc52b1a05818047b88df8834eac9516a084bcc00

  • SHA256

    424577a54a1bf5a3fbb7130c9cb9ff7f7bae41ce9bdeb07b737602d2b1b78db4

  • SHA512

    c27a9f9e27db779246bb4c4995be6d29be02d0cb2a0159a1c44682b5ef27be90011da3fbc9f49239e10e67fa3595b61cd834c284a80b98fcb1f5d4497dac2204

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4spxuSRoPenvKC1KH/H57Mj:91OgLdaIwSRVnvKsKfHpMj

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17096d9515845d24ca55bd5f87de48e9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\17096d9515845d24ca55bd5f87de48e9_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Users\Admin\AppData\Local\Temp\7zS84B1.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • System policy modification
      PID:4652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ADDICT-THING\uninstall.exe

    Filesize

    46KB

    MD5

    8be20144dbd200c6de0c9430ed9280cf

    SHA1

    b81e3aacaaedd66ef0896acabc6983c94758e2b4

    SHA256

    634557ab79a29fe800721bc5f146a9b86799b72eb6755e821492f85ca66818a6

    SHA512

    fd7db954002be6332c8c6f4500fc38c1d5286022bb56f21b97567e837ee3d5a3c6db08cabcd2ffe405e7180918d6bb0b57b330703a9d045851901d01115ff94e

  • C:\Users\Admin\AppData\Local\Temp\7zS84B1.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    f0ded83c97e0190109bc35e59c3a86a3

    SHA1

    8ba0d099b3ae07ed479f45000f422f78a579254f

    SHA256

    9301e5cd5c9018835f5656cdbc01e62968d2cdc305f4230fdd2b12e256463484

    SHA512

    6a437fc06c2db07568606e8a9561f51e6d038d8afb2c05608167e42c5c134290d96a8be80851b01175e579f07685dc49ac1921f497f2f384670ccb24a1cbbb52

  • C:\Users\Admin\AppData\Local\Temp\7zS84B1.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    6a5652948be7ed87ea37a8d00df3213c

    SHA1

    0dc7d1a739b5ccce7b278a863a637fa49cc19b6f

    SHA256

    d0c5ebeec5135a621320fdc091293faf8cfd6dbbb0091a35f4b3a85d82227fe3

    SHA512

    18dc3f9751befb3d7f2510a30757d8d2da24fa512f4cee82679088e65c687acfad2ee19d03b2153323d539a4186064ee4ee7f69d9cd1da53e6732a7fa40a92df

  • C:\Users\Admin\AppData\Local\Temp\7zS84B1.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    959271a23d5b8342dffe9b67bd644c5b

    SHA1

    88ccb9d1fc8c42e5e6ecefade2f74c6ae9e81888

    SHA256

    44b982773417a9b19fa50351ef5e447fa742bfd25bc3486824452ba9cad557cb

    SHA512

    026ea01b90a3502728342c59fb9a6ea8e69f56c98d746b8cfee5beaa97855f6deeda83ba2a171087d0f8c6bbb460839ca945a899f4bb4737bb9211ea6c4180dd

  • C:\Users\Admin\AppData\Local\Temp\7zS84B1.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    66a87fc4758566ca2681ca4c2cef55c4

    SHA1

    b506e622eee0323667a1634659bcf93f92c7fd28

    SHA256

    14fcad83cebe3e8898c49a98660952378f356cdbbf6dca73230fbf87969773f3

    SHA512

    434ecefbf536c3a305cec4713df4d45059180b8cfc4cdc51c55a0c26434810cff89a28eca1dc8d5707fae4788b7a2b3b599fa499cda451e7a2a2de72550f0822

  • C:\Users\Admin\AppData\Local\Temp\7zS84B1.tmp\[email protected]\install.rdf

    Filesize

    714B

    MD5

    b758729808f90eae171ce4e1054ed606

    SHA1

    807724d934afaea2d1c6693ffcee09172b874052

    SHA256

    a7cbdbf3cf2868597b1ec8e1a7740e1edd63c36df9d997f51fc44cbb69c13c19

    SHA512

    4830813c29effcdefc0b6cce27f7d29baeb243b9c13234bfa5cf56ce3748c4cbebc0f2468f8563418748130b26b04ab066ce2018daead5b1c1cf78df20aa16e9

  • C:\Users\Admin\AppData\Local\Temp\7zS84B1.tmp\background.html

    Filesize

    5KB

    MD5

    e1ce9e85bbc0762aced267ce8971b8a9

    SHA1

    0492f606f5c0f873e8952510291b7c2c86c07509

    SHA256

    18ff0bd6c8a299229684f1e421b05655f8b029a0fffef17d3be00f6515f1a263

    SHA512

    017ebc5a187e073dfe189cc994ab8def2ebd3eba97d2c4e750fc1d8a7dff8d2656760e4e66b95b9d6ccf8f8a42aeec738cdf86e6514072c21e3815bf25bd8d25

  • C:\Users\Admin\AppData\Local\Temp\7zS84B1.tmp\bhoclass.dll

    Filesize

    139KB

    MD5

    4b35f6c1f932f52fa9901fbc47b432df

    SHA1

    8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

    SHA256

    2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

    SHA512

    8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

  • C:\Users\Admin\AppData\Local\Temp\7zS84B1.tmp\content.js

    Filesize

    389B

    MD5

    fc98025b810ac34725c989c3914f9320

    SHA1

    d3b6e58f115e851fb27e853e27250cd389fc58d1

    SHA256

    6836608d7af11c3f6f8abc0ebb1d355ae35a74589be4c81c2c12c47df37f9d1b

    SHA512

    d969abf1c2ee4a03420e44a18e314cf823bad24b012ada4013741c3707f92b9867da92f3c251c606e8ebed698d05726dad28af93190a1d35e3ca6851e3319537

  • C:\Users\Admin\AppData\Local\Temp\7zS84B1.tmp\gmafhpohjikemjmcijhemloabkdeepkn.crx

    Filesize

    3KB

    MD5

    524eb21c292194e2c3b1548ee0a32694

    SHA1

    a56563ce9231f5d0fb2cdf08615e5cbaf28f07e4

    SHA256

    80cfaa195d3a4c84396b33d5e52c37f7d0cbeaebfb6f432356281eb4e2392778

    SHA512

    384f861f94ba7a902d5ae848361c1222504e0f36b07b257d019a14e399b20ed2bcf116217c7eb41f4f0a0783eb49df2f38f576f18a1dc9a61781b728dff6fb5e

  • C:\Users\Admin\AppData\Local\Temp\7zS84B1.tmp\settings.ini

    Filesize

    667B

    MD5

    bf576bd6bf604c5b77eaf96803b99840

    SHA1

    1b607fdc5c5f44b75962d9df7bd27b765c7ba649

    SHA256

    67aa79d13c73dbaf36d0c10a0812b3b1588b7967c27c060abba6066e6c83d504

    SHA512

    9df5250de98f620061cbec6a147751f9ae8ad034b9d3d5220e224c1ad9f2009fcf1ddf47d9a0269837e576122fe19e577697fa679848874eb4ce88c0f4d1f6a9

  • C:\Users\Admin\AppData\Local\Temp\7zS84B1.tmp\setup.exe

    Filesize

    61KB

    MD5

    16ef6e914973925977cdc5ef6b8b2565

    SHA1

    4815da2815975b33f5dc94d482e6dbc02588afa6

    SHA256

    6b9a2b64b90799f1d50458dc38fb4e9e13a8abb37210c8f5d9eeedae84c6912f

    SHA512

    c74f0e17878c4598b626edb5e75e7ee098b71c0c26454ba709e2ea438517670ce11abf7d909470e6c935a21d0413c0d14b29960af9bd6a423e3261789a35b059