Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    25/01/2025, 02:55

General

  • Target

    JaffaCakes118_2793cb025fbd21dbfb9baa7d31639cd6.exe

  • Size

    159KB

  • MD5

    2793cb025fbd21dbfb9baa7d31639cd6

  • SHA1

    891cd7b11e19c6ba57ef1a00a9bcc13808b09484

  • SHA256

    754e73d783386a99ea36946cb578d34abe841adb9e32c0471711006d3ffeb61b

  • SHA512

    a09907ff9021e27b7217237e9d2350fe4d89b3e010d410ff7cf7bd58d030f89a4c61d2070b38b9ed55431177e2937334fa318b933591277557952c487c607272

  • SSDEEP

    3072:3Lk395hYXJ1ZfFsuGC5w9RinLEKMWhhXKQMN6PPmlAMosBNI:3QqjZuu/5wTso/UNKQMNQmSMHM

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 32 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2793cb025fbd21dbfb9baa7d31639cd6.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2793cb025fbd21dbfb9baa7d31639cd6.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2308
    • C:\Program Files (x86)\OA\VFDInstall.exe
      "C:\Program Files (x86)\OA\VFDInstall.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 /s "bho_project.dll"
        3⤵
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\OA\bho_project.dll

    Filesize

    90KB

    MD5

    3d460002229cadb478000e336ed844c1

    SHA1

    7053f2dd4e3873dde9b082e577556101bb24773f

    SHA256

    2efbd2f8f49f059127d69d8437e1937ec4c378705a74c1462f853347739c7c83

    SHA512

    1536fbc20805ee07f7a84d26614fca3df94593cf279e59e7afdca68cb2d1c8df3f35d7dbc2ccf6f833ab6dfd94126a2aa4a3eaabbc705b1bc3a2104f8d7eaa97

  • C:\Program Files (x86)\OA\config.ini

    Filesize

    194B

    MD5

    a582b2fdb24ba9f42b963a957e62deda

    SHA1

    1e41c0df8d5d651b9894c7610b1a38fe859a4b0f

    SHA256

    f7cdf988cb6947475caa7ca95acbf5615c7221ebf5f9c819c34ddb91c3bcc39e

    SHA512

    55b8f27f233af62e6e7565679cd18e14b3077c59e8443bdfb6ce779a11960bbd534e51f1feafbf61586ee844be8fe23d1162510d89a51cba620b52e087b9ab2d

  • C:\Program Files (x86)\OA\config.ini

    Filesize

    131B

    MD5

    7abb7c4e80522810d314bc906b8de623

    SHA1

    025289d3b79de2ed0805630743100b4e3ef48a09

    SHA256

    7feda3a928bec6e3ac1d262dddc101010e9d141de3ebc8b6e3bc0f1ca270fc90

    SHA512

    cdacb404f8d6338266a53dd338c3d48df2f25282c723e861639db9dfb13a07ce7897413f4cce1710b8418478f83bba9bcac4b1033a211302d242ccace1ffb03d

  • \Program Files (x86)\OA\VFDInstall.exe

    Filesize

    54KB

    MD5

    bbd5a872f7f1fba57f190708ac817717

    SHA1

    042b1363929b4bc46bc8bc31c1d64335c0c8209d

    SHA256

    5473931a9d66c7ef9a908956b9e41ea2a04acda2d1f5d9866042662f4b3c0e88

    SHA512

    cf86aa506b3cdafd0f9ec83a1171ba23c4a1820bd1d6427b5ebf479e927a8a23979f14ce0ebbec681ee2d1034139df713d4bf6ee28bcffd79cdb49b8f9b5b612

  • \Users\Admin\AppData\Local\Temp\nsyD173.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsyD173.tmp\fct.dll

    Filesize

    4KB

    MD5

    e3f3809f51c7982d96aaf9c090f7d176

    SHA1

    7494daa8000c0b31c58d94edc509232569a4606f

    SHA256

    010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29

    SHA512

    3fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc

  • \Users\Admin\AppData\Local\Temp\nsyD173.tmp\inetc.dll

    Filesize

    20KB

    MD5

    e541458cfe66ef95ffbea40eaaa07289

    SHA1

    caec1233f841ee72004231a3027b13cdeb13274c

    SHA256

    3bce87b66d9272c82421920c34b0216e12c57a437d1955c36f23c74c1a01d420

    SHA512

    0bf6313e4cb7bbdcfba828fb791540b630adc58c43aa4b5ba77790367d0f34f76077cd84cc62e2a2c98c788a88547f32a11e549873d172c5aa2753124847cd0c