Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
3d83fdeed9d5e987900701f236a7de34_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
3d83fdeed9d5e987900701f236a7de34_JaffaCakes118.exe
-
Size
670KB
-
MD5
3d83fdeed9d5e987900701f236a7de34
-
SHA1
6235bacdfcb8d0034c076b81048adb2dc61f63d5
-
SHA256
20709f36c81aa9cc9e1a852f3fcbca07d79e9a933024daff36a6fdd30e5b409a
-
SHA512
a147eacb72e8577618908fa2f328deab25975667ac88996dd63d981045fa4ea1f3391544b5074fedcf9a4bfdbf75f4ebf5bba12f9bccafdf82167d481e89f684
-
SSDEEP
12288:8hdsll5H+iYbHW7CQV1POhmmp+ZGnTtmg3Fxx7JvdakTNacsvHNe:8hiH+iYb27CQjcmi+QnTN3vJxdjpaDN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 3d83fdeed9d5e987900701f236a7de34_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 5060 hpet.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hahpjplbmicfkmoccokbjejahjjpnena\1.2_0\manifest.json hpet.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d83fdeed9d5e987900701f236a7de34_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpet.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page Before = "http://go.microsoft.com/fwlink/p/?LinkId=255141" hpet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page Before = "http://go.microsoft.com/fwlink/?LinkId=54896" hpet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://search.b1.org/?bsrc=hmior&chid=c167991" hpet.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://search.b1.org/?bsrc=hmior&chid=c167991" hpet.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5060 hpet.exe 5060 hpet.exe 5060 hpet.exe 5060 hpet.exe 5060 hpet.exe 5060 hpet.exe 5060 hpet.exe 5060 hpet.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5060 hpet.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2896 wrote to memory of 5060 2896 3d83fdeed9d5e987900701f236a7de34_JaffaCakes118.exe 86 PID 2896 wrote to memory of 5060 2896 3d83fdeed9d5e987900701f236a7de34_JaffaCakes118.exe 86 PID 2896 wrote to memory of 5060 2896 3d83fdeed9d5e987900701f236a7de34_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d83fdeed9d5e987900701f236a7de34_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d83fdeed9d5e987900701f236a7de34_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Roaming\B1Toolbar\hpet.exe"C:\Users\Admin\AppData\Roaming\B1Toolbar\hpet.exe" -home -home2 -hie -hff -hgc -et -channel 1679912⤵
- Executes dropped EXE
- Drops Chrome extension
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
467KB
MD597bc7c2a98ee92297fcb2cecf1b222f9
SHA1b3e08065fff002513c36cfe85e0ca607c68fbce3
SHA2560effc6288b6ce1f933c8b97dc8ec5e6ee883f0628bea176538f65b0b2297d1fe
SHA512a53e1220dfba16fe44f20bfc32dd986054751fb124a1c0917af4c34a45e7a2187ae05098a7681f9ed65cee852e3fbecf8fa49cc015b224dc50566659859986cc