Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
31/12/2024, 06:56
Behavioral task
behavioral1
Sample
JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe
-
Size
570KB
-
MD5
09a93bd29feea6b25159e5e164746ca9
-
SHA1
17f7fffc982a78aaaffb14f295088a03a4f13540
-
SHA256
50b9cf2c1eb6d95baedf2bdcc2366d0510ba78eea4b276331a4a639311612924
-
SHA512
2dd7b93a9a51bf6c97f0a77c3e2ab8320226bc24d6ae1682e4215e23ecfe6364b37f88356f1c115a7588a3a372ba2ac3509b427b909345cb819a5a1e8e153c69
-
SSDEEP
12288:M42NJ2iYSZLJLdvOSsnjS4csBrge6sf7:mYShhJLH4csTJz
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/2932-1-0x0000000000E00000-0x0000000000E94000-memory.dmp family_stormkitty -
Stormkitty family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\0fed001ae92cf1877a51970a1e188bac\Admin@XECUDNCD_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe File created C:\Users\Admin\AppData\Local\0fed001ae92cf1877a51970a1e188bac\Admin@XECUDNCD_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe File created C:\Users\Admin\AppData\Local\0fed001ae92cf1877a51970a1e188bac\Admin@XECUDNCD_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe File created C:\Users\Admin\AppData\Local\0fed001ae92cf1877a51970a1e188bac\Admin@XECUDNCD_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 1220 cmd.exe 1468 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2932 JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe 2932 JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe 2932 JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe 2932 JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe 2932 JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2932 JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1220 2932 JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe 32 PID 2932 wrote to memory of 1220 2932 JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe 32 PID 2932 wrote to memory of 1220 2932 JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe 32 PID 1220 wrote to memory of 2860 1220 cmd.exe 34 PID 1220 wrote to memory of 2860 1220 cmd.exe 34 PID 1220 wrote to memory of 2860 1220 cmd.exe 34 PID 1220 wrote to memory of 1468 1220 cmd.exe 35 PID 1220 wrote to memory of 1468 1220 cmd.exe 35 PID 1220 wrote to memory of 1468 1220 cmd.exe 35 PID 1220 wrote to memory of 2200 1220 cmd.exe 36 PID 1220 wrote to memory of 2200 1220 cmd.exe 36 PID 1220 wrote to memory of 2200 1220 cmd.exe 36 PID 2932 wrote to memory of 288 2932 JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe 37 PID 2932 wrote to memory of 288 2932 JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe 37 PID 2932 wrote to memory of 288 2932 JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe 37 PID 288 wrote to memory of 828 288 cmd.exe 39 PID 288 wrote to memory of 828 288 cmd.exe 39 PID 288 wrote to memory of 828 288 cmd.exe 39 PID 288 wrote to memory of 2408 288 cmd.exe 40 PID 288 wrote to memory of 2408 288 cmd.exe 40 PID 288 wrote to memory of 2408 288 cmd.exe 40 PID 2932 wrote to memory of 1420 2932 JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe 41 PID 2932 wrote to memory of 1420 2932 JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe 41 PID 2932 wrote to memory of 1420 2932 JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09a93bd29feea6b25159e5e164746ca9.exe"1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2860
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1468
-
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:2200
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:828
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2408
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2932 -s 17042⤵PID:1420
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\0fed001ae92cf1877a51970a1e188bac\Admin@XECUDNCD_en-US\Browsers\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\0fed001ae92cf1877a51970a1e188bac\Admin@XECUDNCD_en-US\Directories\Startup.txt
Filesize24B
MD568c93da4981d591704cea7b71cebfb97
SHA1fd0f8d97463cd33892cc828b4ad04e03fc014fa6
SHA256889ed51f9c16a4b989bda57957d3e132b1a9c117ee84e208207f2fa208a59483
SHA51263455c726b55f2d4de87147a75ff04f2daa35278183969ccf185d23707840dd84363bec20d4e8c56252196ce555001ca0e61b3f4887d27577081fdef9e946402
-
C:\Users\Admin\AppData\Local\0fed001ae92cf1877a51970a1e188bac\Admin@XECUDNCD_en-US\Directories\Videos.txt
Filesize23B
MD51fddbf1169b6c75898b86e7e24bc7c1f
SHA1d2091060cb5191ff70eb99c0088c182e80c20f8c
SHA256a67aa329b7d878de61671e18cd2f4b011d11cbac67ea779818c6dafad2d70733
SHA51220bfeafde7fec1753fef59de467bd4a3dd7fe627e8c44e95fe62b065a5768c4508e886ec5d898e911a28cf6365f455c9ab1ebe2386d17a76f53037f99061fd4d
-
C:\Users\Admin\AppData\Local\0fed001ae92cf1877a51970a1e188bac\Admin@XECUDNCD_en-US\System\Process.txt
Filesize1KB
MD5657a05deb2940eea18e3e4a0db215428
SHA1cda4e23dab2339cae01f73eca51bf8a8753a0f11
SHA256fdba69c62581900858c0095dded2df7eb23a5186d0acbb9ee2f3105c62c1fcbe
SHA512aaa0a1e1a2b7afa282571f47668b16c1b8ef4398be677943673905598fca4e9885c5a4e095515688c08af1147e35977e036a8641b6a1345a96a175be578e9f01
-
C:\Users\Admin\AppData\Local\0fed001ae92cf1877a51970a1e188bac\Admin@XECUDNCD_en-US\System\Process.txt
Filesize1KB
MD54a290fffab5bc70034ee6c7e258e01cd
SHA14f47a31fb65f321aff52087dd90874c78b8020c8
SHA256480433e8997dad35a18ba0ecd5cab2064c1562b89ed865a2a9b84c14ea5bea51
SHA5124134707b421529a89b0ce62afc8534f96234cca2365ba07bd04f57c81050703c9fa6bab7576091d6f9e7c63a4f98c6eac5e7ad105f514bc8ec3495e4daa0ec9a
-
C:\Users\Admin\AppData\Local\0fed001ae92cf1877a51970a1e188bac\Admin@XECUDNCD_en-US\System\ProductKey.txt
Filesize29B
MD5cad6c6bee6c11c88f5e2f69f0be6deb7
SHA1289d74c3bebe6cca4e1d2e084482ad6d21316c84
SHA256dc288491fadc4a85e71085890e3d6a7746e99a317cd5ef09a30272dfb10398c0
SHA512e02cf6bff8b4ebd7a1346ecb1667be36c3ef7415fff77c3b9cfb370f3d0dc861f74d3e0e49065699850ba6cc025cd68d14ceb73f3b512c2a9b28873a69aff097
-
C:\Users\Admin\AppData\Local\0fed001ae92cf1877a51970a1e188bac\Admin@XECUDNCD_en-US\System\ScanningNetworks.txt
Filesize59B
MD5409930721dbce1ee58227d109cca4570
SHA1767f86ffec769d8415f07b4372a108cba1bf7221
SHA2566b6dd8b11f84fb78e3e8cfaa7c5fca569d79402b9fc5861b00960b25607c911e
SHA5124875187fce9545a92df636e384f92dcb403dfe80f3cad4a68e79329a1f42e12e9d04948f2a52b939638481da6d3e3b5f5096fe6dfd674ee53cca7c655ec03f17
-
Filesize
968B
MD54eb3a478547ca581fa487551f106728a
SHA1e0060c69c43cb6b28fdd64dbf3a12231dfee6d29
SHA256a56629accb5bf28aaa42a970015d19d7ab80cce3fc8389acc5efd69f405381d3
SHA512b9d88254ddd9d8ae36e732e85fe13522e66f210b55997e3d24ba06026d817e0781a539e2a4d9e0f4f067cde5f570b267e2f38a85994464a883e887b316ac240e