Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2024, 13:07 UTC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe
-
Size
336.4MB
-
MD5
876f5de542386abdc4699b77687e279e
-
SHA1
24c0161a3968a97443be2cd1d1d96181285947bd
-
SHA256
324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26
-
SHA512
d1f12d0611093008d707d04c58dbae510dc84dfeb738a8052c174e2d2b5225226b398417ae918bb64792e41cec69eec4cc7ad66d7c15de0e6c664d3baa897f5b
-
SSDEEP
98304:3QHpw7wLHY5E5ThVOTYheiqTBODGm/RygXAWVWCwi+1j7:AHpw7v5EPuBxeIhWVJw/1P
Malware Config
Extracted
vidar
51.9
670
https://t.me/btc20220425
https://ieji.de/@ronxik213
-
profile_id
670
Signatures
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe -
Vidar Stealer 19 IoCs
resource yara_rule behavioral2/memory/4816-21-0x00000000009B0000-0x00000000010DE000-memory.dmp family_vidar behavioral2/memory/4816-20-0x00000000009B0000-0x00000000010DE000-memory.dmp family_vidar behavioral2/memory/4816-24-0x00000000009B0000-0x00000000010DE000-memory.dmp family_vidar behavioral2/memory/4816-25-0x00000000009B0000-0x00000000010DE000-memory.dmp family_vidar behavioral2/memory/4816-29-0x00000000009B0000-0x00000000010DE000-memory.dmp family_vidar behavioral2/memory/4816-28-0x00000000009B0000-0x00000000010DE000-memory.dmp family_vidar behavioral2/memory/4816-27-0x00000000009B0000-0x00000000010DE000-memory.dmp family_vidar behavioral2/memory/4816-26-0x00000000009B0000-0x00000000010DE000-memory.dmp family_vidar behavioral2/memory/4816-23-0x00000000009B0000-0x00000000010DE000-memory.dmp family_vidar behavioral2/memory/4816-19-0x00000000009B0000-0x00000000010DE000-memory.dmp family_vidar behavioral2/memory/4816-30-0x00000000009B0000-0x00000000010DE000-memory.dmp family_vidar behavioral2/memory/4816-38-0x00000000009B0000-0x00000000010DE000-memory.dmp family_vidar behavioral2/memory/4816-39-0x00000000009B0000-0x00000000010DE000-memory.dmp family_vidar behavioral2/memory/4816-42-0x00000000009B0000-0x00000000010DE000-memory.dmp family_vidar behavioral2/memory/4816-43-0x00000000009B0000-0x00000000010DE000-memory.dmp family_vidar behavioral2/memory/4816-67-0x00000000009B0000-0x00000000010DE000-memory.dmp family_vidar behavioral2/memory/4816-59-0x00000000009B0000-0x00000000010DE000-memory.dmp family_vidar behavioral2/memory/4816-68-0x00000000009B0000-0x00000000010DE000-memory.dmp family_vidar behavioral2/memory/4816-76-0x00000000009B0000-0x00000000010DE000-memory.dmp family_vidar -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4816 JaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe 4816 JaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4816 JaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe 4816 JaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe 4816 JaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe 4816 JaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4816
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request17.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestt.meIN AResponset.meIN A149.154.167.99
-
GEThttps://t.me/btc20220425JaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exeRemote address:149.154.167.99:443RequestGET /btc20220425 HTTP/1.1
Host: t.me
ResponseHTTP/1.1 200 OK
Date: Tue, 24 Dec 2024 13:08:00 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 9608
Connection: keep-alive
Set-Cookie: stel_ssid=48841ef17ac3af9f9e_6070817319675319472; expires=Wed, 25 Dec 2024 13:08:00 GMT; path=/; samesite=None; secure; HttpOnly
Pragma: no-cache
Cache-control: no-store
X-Frame-Options: ALLOW-FROM https://web.telegram.org
Content-Security-Policy: frame-ancestors https://web.telegram.org
Strict-Transport-Security: max-age=35768000
-
Remote address:8.8.8.8:53Requestieji.deIN AResponseieji.deIN A45.135.201.222
-
GEThttps://ieji.de/@ronxik213JaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exeRemote address:45.135.201.222:443RequestGET /@ronxik213 HTTP/1.1
Host: ieji.de
ResponseHTTP/1.1 410 Gone
Content-Length: 1270
Server: kazu.host
X-Frame-Options: DENY
X-Content-Type-Options: nosniff
X-XSS-Protection: 0
Referrer-Policy: same-origin
Date: Tue, 24 Dec 2024 13:08:01 GMT
Content-Type: text/html; charset=utf-8
Cache-Control: max-age=180, public
Content-Security-Policy: base-uri 'none'; default-src 'none'; frame-ancestors 'none'; font-src 'self' https://ieji.de; img-src 'self' data: blob: https://ieji.de https://ftp.ieji.de; style-src 'self' https://ieji.de 'nonce-NJ7+Juxog1rM5VWwg/k0dA=='; media-src 'self' data: https://ieji.de https://ftp.ieji.de; manifest-src 'self' https://ieji.de; form-action 'none'; child-src 'self' blob: https://ieji.de; worker-src 'self' blob: https://ieji.de; connect-src 'self' data: blob: https://ieji.de https://ftp.ieji.de wss://ieji.de; script-src 'self' https://ieji.de 'wasm-unsafe-eval'; frame-src 'self' https:
X-Request-Id: 82bf3787-54f9-4f6b-b7a1-7aa92f4c749e
X-Runtime: 0.004128
vary: Accept, Accept-Language, Cookie, Origin
content-security-policy: upgrade-insecure-requests
cache-control: max-age=0, public, immutable, no-transform
feature-policy: camera 'none'; microphone 'none'; payment 'none'
strict-transport-security: max-age=63072000; includeSubDomains; preload
alt-svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-clacks-overhead: GNU Terry Pratchett
onion-location: https://iejideks5zu2v3zuthaxu5zz6m5o2j7vmbd24wh6dnuiyl7c6rfkcryd.onion/
-
DNSr10.o.lencr.orgJaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exeRemote address:8.8.8.8:53Requestr10.o.lencr.orgIN AResponser10.o.lencr.orgIN CNAMEo.lencr.edgesuite.neto.lencr.edgesuite.netIN CNAMEa1887.dscq.akamai.neta1887.dscq.akamai.netIN A88.221.134.137a1887.dscq.akamai.netIN A88.221.135.105
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request99.167.154.149.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request23.249.124.192.in-addr.arpaIN PTRResponse23.249.124.192.in-addr.arpaIN PTRcloudproxy10023sucurinet
-
Remote address:8.8.8.8:53Request222.201.135.45.in-addr.arpaIN PTRResponse222.201.135.45.in-addr.arpaIN PTRiejide
-
Remote address:8.8.8.8:53Request168.245.100.95.in-addr.arpaIN PTRResponse168.245.100.95.in-addr.arpaIN PTRa95-100-245-168deploystaticakamaitechnologiescom
-
GEThttp://r10.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRpD%2BQVZ%2B1vf7U0RGQGBm8JZwdxcgQUdKR2KRcYVIUxN75n5gZYwLzFBXICEgMPX%2FJP1kwSvK1699N7ZWR4Ow%3D%3DJaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exeRemote address:88.221.134.137:80RequestGET /MFMwUTBPME0wSzAJBgUrDgMCGgUABBRpD%2BQVZ%2B1vf7U0RGQGBm8JZwdxcgQUdKR2KRcYVIUxN75n5gZYwLzFBXICEgMPX%2FJP1kwSvK1699N7ZWR4Ow%3D%3D HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/10.0
Host: r10.o.lencr.org
ResponseHTTP/1.1 200 OK
Content-Type: application/ocsp-response
Content-Length: 504
ETag: "D96543E5AF17E9B64F6DF261AE4651A8BB6BE7AF3274F31CA9613E0B710641F8"
Last-Modified: Tue, 24 Dec 2024 13:08:00 UTC
Cache-Control: public, no-transform, must-revalidate, max-age=21600
Expires: Tue, 24 Dec 2024 19:08:00 GMT
Date: Tue, 24 Dec 2024 13:08:00 GMT
Connection: keep-alive
-
Remote address:8.8.8.8:53Request137.134.221.88.in-addr.arpaIN PTRResponse137.134.221.88.in-addr.arpaIN PTRa88-221-134-137deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request56.163.245.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.227.111.52.in-addr.arpaIN PTR
-
GEThttps://t.me/btc20220425JaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exeRemote address:149.154.167.99:443RequestGET /btc20220425 HTTP/1.1
Host: t.me
Cookie: stel_ssid=48841ef17ac3af9f9e_6070817319675319472
ResponseHTTP/1.1 200 OK
Date: Tue, 24 Dec 2024 13:10:01 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 9608
Connection: keep-alive
Pragma: no-cache
Cache-control: no-store
X-Frame-Options: ALLOW-FROM https://web.telegram.org
Content-Security-Policy: frame-ancestors https://web.telegram.org
Strict-Transport-Security: max-age=35768000
-
GEThttps://ieji.de/@ronxik213JaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exeRemote address:45.135.201.222:443RequestGET /@ronxik213 HTTP/1.1
Host: ieji.de
ResponseHTTP/1.1 410 Gone
Content-Length: 1270
Server: kazu.host
X-Frame-Options: DENY
X-Content-Type-Options: nosniff
X-XSS-Protection: 0
Referrer-Policy: same-origin
Date: Tue, 24 Dec 2024 13:10:01 GMT
Content-Type: text/html; charset=utf-8
Cache-Control: max-age=180, public
Content-Security-Policy: base-uri 'none'; default-src 'none'; frame-ancestors 'none'; font-src 'self' https://ieji.de; img-src 'self' data: blob: https://ieji.de https://ftp.ieji.de; style-src 'self' https://ieji.de 'nonce-JDNP2GFU2PnieXCBEQmTew=='; media-src 'self' data: https://ieji.de https://ftp.ieji.de; manifest-src 'self' https://ieji.de; form-action 'none'; child-src 'self' blob: https://ieji.de; worker-src 'self' blob: https://ieji.de; connect-src 'self' data: blob: https://ieji.de https://ftp.ieji.de wss://ieji.de; script-src 'self' https://ieji.de 'wasm-unsafe-eval'; frame-src 'self' https:
X-Request-Id: 6cee5b67-088a-4086-b3e0-ce068db13def
X-Runtime: 0.004516
vary: Accept, Accept-Language, Cookie, Origin
content-security-policy: upgrade-insecure-requests
cache-control: max-age=0, public, immutable, no-transform
feature-policy: camera 'none'; microphone 'none'; payment 'none'
strict-transport-security: max-age=63072000; includeSubDomains; preload
alt-svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-clacks-overhead: GNU Terry Pratchett
onion-location: https://iejideks5zu2v3zuthaxu5zz6m5o2j7vmbd24wh6dnuiyl7c6rfkcryd.onion/
-
Remote address:8.8.8.8:53Request153.141.79.40.in-addr.arpaIN PTRResponse
-
149.154.167.99:443https://t.me/btc20220425tls, httpJaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe1.4kB 16.7kB 23 19
HTTP Request
GET https://t.me/btc20220425HTTP Response
200 -
45.135.201.222:443https://ieji.de/@ronxik213tls, httpJaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe971 B 7.2kB 14 11
HTTP Request
GET https://ieji.de/@ronxik213HTTP Response
410 -
88.221.134.137:80http://r10.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRpD%2BQVZ%2B1vf7U0RGQGBm8JZwdxcgQUdKR2KRcYVIUxN75n5gZYwLzFBXICEgMPX%2FJP1kwSvK1699N7ZWR4Ow%3D%3DhttpJaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe518 B 1.1kB 6 4
HTTP Request
GET http://r10.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRpD%2BQVZ%2B1vf7U0RGQGBm8JZwdxcgQUdKR2KRcYVIUxN75n5gZYwLzFBXICEgMPX%2FJP1kwSvK1699N7ZWR4Ow%3D%3DHTTP Response
200 -
149.154.167.99:443https://t.me/btc20220425tls, httpJaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe1.3kB 10.7kB 17 14
HTTP Request
GET https://t.me/btc20220425HTTP Response
200 -
45.135.201.222:443https://ieji.de/@ronxik213tls, httpJaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe999 B 3.5kB 11 9
HTTP Request
GET https://ieji.de/@ronxik213HTTP Response
410
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
17.160.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
8.8.8.8:53t.mednsJaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe50 B 66 B 1 1
DNS Request
t.me
DNS Response
149.154.167.99
-
8.8.8.8:53ieji.dednsJaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe53 B 69 B 1 1
DNS Request
ieji.de
DNS Response
45.135.201.222
-
8.8.8.8:53r10.o.lencr.orgdnsJaffaCakes118_324c6159854181351a28a38c3f38a00007f2f150ef0d1c77fcc30424a8de6b26.exe61 B 160 B 1 1
DNS Request
r10.o.lencr.org
DNS Response
88.221.134.13788.221.135.105
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
73 B 166 B 1 1
DNS Request
99.167.154.149.in-addr.arpa
-
73 B 113 B 1 1
DNS Request
23.249.124.192.in-addr.arpa
-
73 B 94 B 1 1
DNS Request
222.201.135.45.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
168.245.100.95.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
137.134.221.88.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
56.163.245.4.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
13.227.111.52.in-addr.arpa
DNS Request
13.227.111.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
153.141.79.40.in-addr.arpa