Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2025, 14:56 UTC

General

  • Target

    JaffaCakes118_7a50c281feea0a42e92925197fd9bd81.exe

  • Size

    349KB

  • MD5

    7a50c281feea0a42e92925197fd9bd81

  • SHA1

    130254f2739501ad83e04c02899c7ea9b2eca81f

  • SHA256

    4138dc4d3e022c8b07238a11b602a0ff69caf99af236cf24a20295d753ec8b66

  • SHA512

    1e8d6cb485aa169e7405ffb88dcef35b6443b0f1f43f4927fbb7f2719af1bfd04213f7e90ad48405f2dd2675cc19b7880101ef3b28e3aacbd6c71efb78822456

  • SSDEEP

    6144:ybkHQbHl7cxAOheBuI17jCmnrXculxMgtg9A8zv9i1Qo96l6OB+knYru89x275yh:ybk+7uAOgQI5G4xxHm9AOv9iSo99S+Mw

Malware Config

Signatures

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 2 IoCs
  • Isrstealer family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a50c281feea0a42e92925197fd9bd81.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a50c281feea0a42e92925197fd9bd81.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a50c281feea0a42e92925197fd9bd81.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a50c281feea0a42e92925197fd9bd81.exe
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3736
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a50c281feea0a42e92925197fd9bd81.exe
        /scomma "C:\Users\Admin\AppData\Local\Temp\9KM6zpy27v.ini"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4688
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a50c281feea0a42e92925197fd9bd81.exe
        /scomma "C:\Users\Admin\AppData\Local\Temp\PnrtMjy4Qv.ini"
        3⤵
          PID:4472
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 80
            4⤵
            • Program crash
            PID:2364
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 4472 -ip 4472
      1⤵
        PID:2640

      Network

      • flag-us
        DNS
        8.8.8.8.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        8.8.8.8.in-addr.arpa
        IN PTR
        Response
        8.8.8.8.in-addr.arpa
        IN PTR
        dnsgoogle
      • flag-us
        DNS
        149.220.183.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        149.220.183.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        8.153.16.2.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        8.153.16.2.in-addr.arpa
        IN PTR
        Response
        8.153.16.2.in-addr.arpa
        IN PTR
        a2-16-153-8deploystaticakamaitechnologiescom
      • flag-us
        DNS
        22.160.190.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        22.160.190.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        95.221.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        95.221.229.192.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        133.211.185.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        133.211.185.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        sab2.netii.net
        JaffaCakes118_7a50c281feea0a42e92925197fd9bd81.exe
        Remote address:
        8.8.8.8:53
        Request
        sab2.netii.net
        IN A
        Response
      • flag-us
        DNS
        sab2.netii.net
        JaffaCakes118_7a50c281feea0a42e92925197fd9bd81.exe
        Remote address:
        8.8.8.8:53
        Request
        sab2.netii.net
        IN A
        Response
      • flag-us
        DNS
        sab2.netii.net
        JaffaCakes118_7a50c281feea0a42e92925197fd9bd81.exe
        Remote address:
        8.8.8.8:53
        Request
        sab2.netii.net
        IN A
        Response
      • flag-us
        DNS
        sab2.netii.net
        JaffaCakes118_7a50c281feea0a42e92925197fd9bd81.exe
        Remote address:
        8.8.8.8:53
        Request
        sab2.netii.net
        IN A
        Response
      • flag-us
        DNS
        197.87.175.4.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        197.87.175.4.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        15.164.165.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        15.164.165.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        172.210.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.210.232.199.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        172.214.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.214.232.199.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        48.229.111.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        48.229.111.52.in-addr.arpa
        IN PTR
        Response
      No results found
      • 8.8.8.8:53
        8.8.8.8.in-addr.arpa
        dns
        66 B
        90 B
        1
        1

        DNS Request

        8.8.8.8.in-addr.arpa

      • 8.8.8.8:53
        149.220.183.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        149.220.183.52.in-addr.arpa

      • 8.8.8.8:53
        8.153.16.2.in-addr.arpa
        dns
        69 B
        131 B
        1
        1

        DNS Request

        8.153.16.2.in-addr.arpa

      • 8.8.8.8:53
        22.160.190.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        22.160.190.20.in-addr.arpa

      • 8.8.8.8:53
        95.221.229.192.in-addr.arpa
        dns
        73 B
        144 B
        1
        1

        DNS Request

        95.221.229.192.in-addr.arpa

      • 8.8.8.8:53
        133.211.185.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        133.211.185.52.in-addr.arpa

      • 8.8.8.8:53
        sab2.netii.net
        dns
        JaffaCakes118_7a50c281feea0a42e92925197fd9bd81.exe
        240 B
        240 B
        4
        4

        DNS Request

        sab2.netii.net

        DNS Request

        sab2.netii.net

        DNS Request

        sab2.netii.net

        DNS Request

        sab2.netii.net

      • 8.8.8.8:53
        197.87.175.4.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        197.87.175.4.in-addr.arpa

      • 8.8.8.8:53
        15.164.165.52.in-addr.arpa
        dns
        72 B
        146 B
        1
        1

        DNS Request

        15.164.165.52.in-addr.arpa

      • 8.8.8.8:53
        172.210.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.210.232.199.in-addr.arpa

      • 8.8.8.8:53
        172.214.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.214.232.199.in-addr.arpa

      • 8.8.8.8:53
        48.229.111.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        48.229.111.52.in-addr.arpa

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\9KM6zpy27v.ini

        Filesize

        5B

        MD5

        d1ea279fb5559c020a1b4137dc4de237

        SHA1

        db6f8988af46b56216a6f0daf95ab8c9bdb57400

        SHA256

        fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba

        SHA512

        720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3

      • memory/1784-20-0x00000000753F0000-0x00000000759A1000-memory.dmp

        Filesize

        5.7MB

      • memory/1784-0-0x00000000753F2000-0x00000000753F3000-memory.dmp

        Filesize

        4KB

      • memory/1784-3-0x00000000753F0000-0x00000000759A1000-memory.dmp

        Filesize

        5.7MB

      • memory/1784-5-0x00000000753F0000-0x00000000759A1000-memory.dmp

        Filesize

        5.7MB

      • memory/1784-4-0x00000000753F2000-0x00000000753F3000-memory.dmp

        Filesize

        4KB

      • memory/1784-6-0x00000000753F0000-0x00000000759A1000-memory.dmp

        Filesize

        5.7MB

      • memory/1784-2-0x00000000753F0000-0x00000000759A1000-memory.dmp

        Filesize

        5.7MB

      • memory/1784-1-0x00000000753F0000-0x00000000759A1000-memory.dmp

        Filesize

        5.7MB

      • memory/1784-7-0x00000000753F0000-0x00000000759A1000-memory.dmp

        Filesize

        5.7MB

      • memory/3736-8-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/3736-10-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/4688-16-0x0000000000400000-0x0000000000453000-memory.dmp

        Filesize

        332KB

      • memory/4688-19-0x0000000000400000-0x0000000000453000-memory.dmp

        Filesize

        332KB

      • memory/4688-22-0x0000000000400000-0x0000000000453000-memory.dmp

        Filesize

        332KB

      • memory/4688-18-0x0000000000400000-0x0000000000453000-memory.dmp

        Filesize

        332KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.