Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2025, 02:55
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe
-
Size
2.2MB
-
MD5
0a5d834587ed9c39cbd9e05b5db46df8
-
SHA1
a2f17d9474decfefdbba23b31dfc47dd662bb265
-
SHA256
d33e00381cdafc0c33431016e4781e12e7d335e83ba405ae242ed54044af98d2
-
SHA512
376866e27e8244c6630576294ad3a8edee53bdf30f210f46011f5cfc599db2c4853c523b0e792f17a1f1ad2021066f875c67d9a5b0e61d25a95a0d1e09c8df5b
-
SSDEEP
12288:gOt1G044leEK+3ExXvA8fR5mPVr7iG2eXNPnrEdrE:SLhEK0q/A8fR5mPVr7iGxXN/odo
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
reptw.xyz - Port:
587 - Username:
[email protected] - Password:
=W;D)NMYK*HI - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral2/memory/3908-6-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation dfxzdg.exe -
Executes dropped EXE 2 IoCs
pid Process 2548 dfxzdg.exe 1280 dfxzdg.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 checkip.dyndns.org 16 freegeoip.app 17 freegeoip.app 48 freegeoip.app -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4928 set thread context of 3908 4928 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 82 PID 2548 set thread context of 1280 2548 dfxzdg.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2080 3908 WerFault.exe 82 1612 1280 WerFault.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfxzdg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfxzdg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5108 schtasks.exe 4216 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3908 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 1280 dfxzdg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4928 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe Token: SeDebugPrivilege 3908 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe Token: SeDebugPrivilege 2548 dfxzdg.exe Token: SeDebugPrivilege 1280 dfxzdg.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 4928 wrote to memory of 3908 4928 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 82 PID 4928 wrote to memory of 3908 4928 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 82 PID 4928 wrote to memory of 3908 4928 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 82 PID 4928 wrote to memory of 3908 4928 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 82 PID 4928 wrote to memory of 3908 4928 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 82 PID 4928 wrote to memory of 3908 4928 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 82 PID 4928 wrote to memory of 3908 4928 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 82 PID 4928 wrote to memory of 3908 4928 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 82 PID 4928 wrote to memory of 452 4928 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 83 PID 4928 wrote to memory of 452 4928 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 83 PID 4928 wrote to memory of 452 4928 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 83 PID 4928 wrote to memory of 3480 4928 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 85 PID 4928 wrote to memory of 3480 4928 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 85 PID 4928 wrote to memory of 3480 4928 JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe 85 PID 452 wrote to memory of 4216 452 cmd.exe 87 PID 452 wrote to memory of 4216 452 cmd.exe 87 PID 452 wrote to memory of 4216 452 cmd.exe 87 PID 2548 wrote to memory of 1280 2548 dfxzdg.exe 101 PID 2548 wrote to memory of 1280 2548 dfxzdg.exe 101 PID 2548 wrote to memory of 1280 2548 dfxzdg.exe 101 PID 2548 wrote to memory of 1280 2548 dfxzdg.exe 101 PID 2548 wrote to memory of 1280 2548 dfxzdg.exe 101 PID 2548 wrote to memory of 1280 2548 dfxzdg.exe 101 PID 2548 wrote to memory of 1280 2548 dfxzdg.exe 101 PID 2548 wrote to memory of 1280 2548 dfxzdg.exe 101 PID 2548 wrote to memory of 112 2548 dfxzdg.exe 102 PID 2548 wrote to memory of 112 2548 dfxzdg.exe 102 PID 2548 wrote to memory of 112 2548 dfxzdg.exe 102 PID 2548 wrote to memory of 3788 2548 dfxzdg.exe 103 PID 2548 wrote to memory of 3788 2548 dfxzdg.exe 103 PID 2548 wrote to memory of 3788 2548 dfxzdg.exe 103 PID 112 wrote to memory of 5108 112 cmd.exe 106 PID 112 wrote to memory of 5108 112 cmd.exe 106 PID 112 wrote to memory of 5108 112 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 17883⤵
- Program crash
PID:2080
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4216
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a5d834587ed9c39cbd9e05b5db46df8.exe" "C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 3908 -ip 39081⤵PID:4004
-
C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exeC:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe"C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 17883⤵
- Program crash
PID:1612
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5108
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe" "C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1280 -ip 12801⤵PID:4128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD50a5d834587ed9c39cbd9e05b5db46df8
SHA1a2f17d9474decfefdbba23b31dfc47dd662bb265
SHA256d33e00381cdafc0c33431016e4781e12e7d335e83ba405ae242ed54044af98d2
SHA512376866e27e8244c6630576294ad3a8edee53bdf30f210f46011f5cfc599db2c4853c523b0e792f17a1f1ad2021066f875c67d9a5b0e61d25a95a0d1e09c8df5b