Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/01/2025, 02:55
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe
-
Size
2.2MB
-
MD5
0a5d834587ed9c39cbd9e05b5db46df8
-
SHA1
a2f17d9474decfefdbba23b31dfc47dd662bb265
-
SHA256
d33e00381cdafc0c33431016e4781e12e7d335e83ba405ae242ed54044af98d2
-
SHA512
376866e27e8244c6630576294ad3a8edee53bdf30f210f46011f5cfc599db2c4853c523b0e792f17a1f1ad2021066f875c67d9a5b0e61d25a95a0d1e09c8df5b
-
SSDEEP
12288:gOt1G044leEK+3ExXvA8fR5mPVr7iG2eXNPnrEdrE:SLhEK0q/A8fR5mPVr7iGxXN/odo
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
reptw.xyz - Port:
587 - Username:
[email protected] - Password:
=W;D)NMYK*HI - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 5 IoCs
resource yara_rule behavioral1/memory/2764-7-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2764-6-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2764-10-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2764-14-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2764-12-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
Executes dropped EXE 2 IoCs
pid Process 1388 dfxzdg.exe 2868 dfxzdg.exe -
Loads dropped DLL 5 IoCs
pid Process 1980 WerFault.exe 1980 WerFault.exe 1980 WerFault.exe 1980 WerFault.exe 1980 WerFault.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 freegeoip.app 9 freegeoip.app 16 freegeoip.app 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2776 set thread context of 2764 2776 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 30 PID 1388 set thread context of 2868 1388 dfxzdg.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2108 2764 WerFault.exe 30 1980 2868 WerFault.exe 39 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfxzdg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfxzdg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2592 schtasks.exe 1492 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2764 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 2868 dfxzdg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2776 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe Token: SeDebugPrivilege 2764 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe Token: SeDebugPrivilege 1388 dfxzdg.exe Token: SeDebugPrivilege 2868 dfxzdg.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2764 2776 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 30 PID 2776 wrote to memory of 2764 2776 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 30 PID 2776 wrote to memory of 2764 2776 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 30 PID 2776 wrote to memory of 2764 2776 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 30 PID 2776 wrote to memory of 2764 2776 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 30 PID 2776 wrote to memory of 2764 2776 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 30 PID 2776 wrote to memory of 2764 2776 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 30 PID 2776 wrote to memory of 2764 2776 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 30 PID 2776 wrote to memory of 2764 2776 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 30 PID 2776 wrote to memory of 2856 2776 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 31 PID 2776 wrote to memory of 2856 2776 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 31 PID 2776 wrote to memory of 2856 2776 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 31 PID 2776 wrote to memory of 2856 2776 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 31 PID 2776 wrote to memory of 2572 2776 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 32 PID 2776 wrote to memory of 2572 2776 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 32 PID 2776 wrote to memory of 2572 2776 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 32 PID 2776 wrote to memory of 2572 2776 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 32 PID 2856 wrote to memory of 2592 2856 cmd.exe 35 PID 2856 wrote to memory of 2592 2856 cmd.exe 35 PID 2856 wrote to memory of 2592 2856 cmd.exe 35 PID 2856 wrote to memory of 2592 2856 cmd.exe 35 PID 2764 wrote to memory of 2108 2764 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 36 PID 2764 wrote to memory of 2108 2764 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 36 PID 2764 wrote to memory of 2108 2764 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 36 PID 2764 wrote to memory of 2108 2764 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 36 PID 2912 wrote to memory of 1388 2912 taskeng.exe 38 PID 2912 wrote to memory of 1388 2912 taskeng.exe 38 PID 2912 wrote to memory of 1388 2912 taskeng.exe 38 PID 2912 wrote to memory of 1388 2912 taskeng.exe 38 PID 1388 wrote to memory of 2868 1388 dfxzdg.exe 39 PID 1388 wrote to memory of 2868 1388 dfxzdg.exe 39 PID 1388 wrote to memory of 2868 1388 dfxzdg.exe 39 PID 1388 wrote to memory of 2868 1388 dfxzdg.exe 39 PID 1388 wrote to memory of 2868 1388 dfxzdg.exe 39 PID 1388 wrote to memory of 2868 1388 dfxzdg.exe 39 PID 1388 wrote to memory of 2868 1388 dfxzdg.exe 39 PID 1388 wrote to memory of 2868 1388 dfxzdg.exe 39 PID 1388 wrote to memory of 2868 1388 dfxzdg.exe 39 PID 1388 wrote to memory of 1588 1388 dfxzdg.exe 40 PID 1388 wrote to memory of 1588 1388 dfxzdg.exe 40 PID 1388 wrote to memory of 1588 1388 dfxzdg.exe 40 PID 1388 wrote to memory of 1588 1388 dfxzdg.exe 40 PID 1388 wrote to memory of 1352 1388 dfxzdg.exe 42 PID 1388 wrote to memory of 1352 1388 dfxzdg.exe 42 PID 1388 wrote to memory of 1352 1388 dfxzdg.exe 42 PID 1388 wrote to memory of 1352 1388 dfxzdg.exe 42 PID 1588 wrote to memory of 1492 1588 cmd.exe 43 PID 1588 wrote to memory of 1492 1588 cmd.exe 43 PID 1588 wrote to memory of 1492 1588 cmd.exe 43 PID 1588 wrote to memory of 1492 1588 cmd.exe 43 PID 2868 wrote to memory of 1980 2868 dfxzdg.exe 45 PID 2868 wrote to memory of 1980 2868 dfxzdg.exe 45 PID 2868 wrote to memory of 1980 2868 dfxzdg.exe 45 PID 2868 wrote to memory of 1980 2868 dfxzdg.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 15763⤵
- Program crash
PID:2108
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2592
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe" "C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2572
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {CE209C76-30CF-49BA-A779-FFED16B9D20F} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exeC:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe"C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 15684⤵
- Loads dropped DLL
- Program crash
PID:1980
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1492
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe" "C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1352
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD50a5d834587ed9c39cbd9e05b5db46df8
SHA1a2f17d9474decfefdbba23b31dfc47dd662bb265
SHA256d33e00381cdafc0c33431016e4781e12e7d335e83ba405ae242ed54044af98d2
SHA512376866e27e8244c6630576294ad3a8edee53bdf30f210f46011f5cfc599db2c4853c523b0e792f17a1f1ad2021066f875c67d9a5b0e61d25a95a0d1e09c8df5b