Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 06:33
Static task
static1
Behavioral task
behavioral1
Sample
20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe
-
Size
670KB
-
MD5
20180a09bd56f0614df702155b59eb22
-
SHA1
a965cd7150fb405653d59994344b4941c8fdf6be
-
SHA256
55b4dfd9f6a64f7a2b86033f0808e1850cebb5819e476e9dcd25d59bf09366c1
-
SHA512
c88387b6b9490cb13de28e04bbdabde9437c8ad27fb8c9ee5110ffe12180821bb5a0f4621fb80611e7bbc5b274124e2c94154ef570b8eaa48abf4e066acb87fb
-
SSDEEP
6144:F2n5g3PZMegQUFyGy+3Lg57V1OnheX88VVcPnxSXeqpZE4GRfKx/8GcsMBvMCmJO:F252EQUFuCgJ/s2q5Gep4E+esTCmfU
Malware Config
Extracted
netwire
centos4u.strangled.net:1337
centos44.myftp.biz:1337
-
activex_autorun
true
-
activex_key
{3G3GH5DC-0RYG-I32H-266Y-2RMB2EO7OHX0}
-
copy_executable
true
-
delete_original
false
-
host_id
ZOZO
-
install_path
%AppData%\Adobe\Firefox.exe
-
keylogger_dir
%AppData%\L0JJ\
-
lock_executable
true
-
mutex
RvPShIvm
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
Defenderss
-
use_mutex
true
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
NetWire RAT payload 6 IoCs
resource yara_rule behavioral2/memory/3040-57-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral2/memory/3040-59-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral2/memory/3040-61-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral2/memory/1592-79-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral2/memory/1592-83-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral2/memory/1592-84-0x0000000000400000-0x0000000000420000-memory.dmp netwire -
ModiLoader Second Stage 8 IoCs
resource yara_rule behavioral2/memory/4472-52-0x0000000000400000-0x0000000000557000-memory.dmp modiloader_stage2 behavioral2/memory/4472-62-0x0000000000400000-0x0000000000557000-memory.dmp modiloader_stage2 behavioral2/memory/4472-68-0x0000000000400000-0x0000000000557000-memory.dmp modiloader_stage2 behavioral2/memory/4692-73-0x0000000000400000-0x0000000000557000-memory.dmp modiloader_stage2 behavioral2/memory/4692-74-0x0000000000400000-0x0000000000557000-memory.dmp modiloader_stage2 behavioral2/memory/4692-76-0x0000000000400000-0x0000000000557000-memory.dmp modiloader_stage2 behavioral2/memory/4692-75-0x0000000000400000-0x0000000000557000-memory.dmp modiloader_stage2 behavioral2/memory/4692-82-0x0000000000400000-0x0000000000557000-memory.dmp modiloader_stage2 -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3G3GH5DC-0RYG-I32H-266Y-2RMB2EO7OHX0}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Firefox.exe\"" Firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3G3GH5DC-0RYG-I32H-266Y-2RMB2EO7OHX0} Firefox.exe -
Executes dropped EXE 2 IoCs
pid Process 4692 Firefox.exe 1592 Firefox.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Defenderss = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Firefox.exe" Firefox.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4472 set thread context of 3040 4472 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 85 PID 4692 set thread context of 1592 4692 Firefox.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Firefox.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4472 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 4472 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 4472 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 4472 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 4472 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 4472 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 4692 Firefox.exe 4692 Firefox.exe 4692 Firefox.exe 4692 Firefox.exe 4692 Firefox.exe 4692 Firefox.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4472 wrote to memory of 3040 4472 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 85 PID 4472 wrote to memory of 3040 4472 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 85 PID 4472 wrote to memory of 3040 4472 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 85 PID 4472 wrote to memory of 3040 4472 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 85 PID 4472 wrote to memory of 3040 4472 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 85 PID 3040 wrote to memory of 4692 3040 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 86 PID 3040 wrote to memory of 4692 3040 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 86 PID 3040 wrote to memory of 4692 3040 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 86 PID 4692 wrote to memory of 1592 4692 Firefox.exe 87 PID 4692 wrote to memory of 1592 4692 Firefox.exe 87 PID 4692 wrote to memory of 1592 4692 Firefox.exe 87 PID 4692 wrote to memory of 1592 4692 Firefox.exe 87 PID 4692 wrote to memory of 1592 4692 Firefox.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Roaming\Adobe\Firefox.exe"C:\Users\Admin\AppData\Roaming\Adobe\Firefox.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Roaming\Adobe\Firefox.exe"C:\Users\Admin\AppData\Roaming\Adobe\Firefox.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
PID:1592
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
670KB
MD520180a09bd56f0614df702155b59eb22
SHA1a965cd7150fb405653d59994344b4941c8fdf6be
SHA25655b4dfd9f6a64f7a2b86033f0808e1850cebb5819e476e9dcd25d59bf09366c1
SHA512c88387b6b9490cb13de28e04bbdabde9437c8ad27fb8c9ee5110ffe12180821bb5a0f4621fb80611e7bbc5b274124e2c94154ef570b8eaa48abf4e066acb87fb