Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/01/2025, 03:00

General

  • Target

    JaffaCakes118_279ccd16a9d80a66314b62a23cbd239a.exe

  • Size

    34KB

  • MD5

    279ccd16a9d80a66314b62a23cbd239a

  • SHA1

    cee65c61b418920c8f54000fe44bfff2f6af7978

  • SHA256

    e0375f90963663238e25c76df5dccfe753f2ee62bb5c73767d7f0745eb29d5b5

  • SHA512

    5b6a85e6bd99c5b8f78b5557b001eddf779e0f8249e18a74f8121799ea583c259d08c2a414a7527fab30f4c103cff9df6be37cad9002cdc407576f0c065adb62

  • SSDEEP

    768:dW0mUuSGqv4DRMFU4MVwu3U9oRBSsIC4nZpbd32:dMdAXf8f4oRBSsR4Zf

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Modifies Shared Task Scheduler registry keys 2 TTPs 2 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_279ccd16a9d80a66314b62a23cbd239a.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_279ccd16a9d80a66314b62a23cbd239a.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Windows\SysWOW64\exeha2.exe
      C:\Windows\system32\exeha2.exe
      2⤵
      • Modifies Shared Task Scheduler registry keys
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3488
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Windows\system32\birdihuy32.dll, load
        3⤵
        • Modifies security service
        • Windows security bypass
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:4040
    • C:\Windows\SysWOW64\exeha3.exe
      C:\Windows\system32\exeha3.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2396
      • C:\Windows\inet20099\services.exe
        C:\Windows\inet20099\services.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:1412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\birdihuy.dll

    Filesize

    62B

    MD5

    851ae078a541f99b05e0f7d337f0a428

    SHA1

    53b2107e2909a3fefcc4b5c81b992aa799b76ffd

    SHA256

    df00396a229cdb5cd40d745f5f148a5f9d6272c7f2b6d910078257dfd0b02541

    SHA512

    3e07cc70dd57cabc298a59a30ce6d2369051f5bb438975ae80a3455be2ad1fcf6541f64cbe3e38700e02627e38cbfea1946717aa9687a6e1c92b74afa0968462

  • C:\Windows\SysWOW64\birdihuy32.dll

    Filesize

    28KB

    MD5

    9f1c675391021bfb71436abda96e23a1

    SHA1

    4128e1ecaa454dba81eefc345c675b8a28810d37

    SHA256

    2671cfb8c30c87ad32d265bc2e3ffbf74fd26008befb639889445c7125b519d8

    SHA512

    28394acfceb70f66eb418631ee9d41e30c9dd59fbc4057958a0cb2e94fdd9e8400a952fb06100c38bcbdfaa29363a2bc9bc0db9449b23f764fbe54e88873a0bf

  • C:\Windows\SysWOW64\exeha2.exe

    Filesize

    11KB

    MD5

    5310d379b453f06b4a55a9628ac7caa1

    SHA1

    a5b0b9ea3650692dd77a77b0447c2d862db87638

    SHA256

    c62a64c3a9930c74b20b4146c9dec04839b854d16c5d3a00042e35e02f206db7

    SHA512

    20b4836c3116afb9274e9a929a58bb5a37ad5a9b37339151c18fe8b96cca0d500ba11b4daca30ec11a684059324aa68d51622861ef8fbbf3d41e8d0bc1113082

  • C:\Windows\SysWOW64\exeha3.exe

    Filesize

    12KB

    MD5

    80ae1a8241952ad7d36570c12c53e10f

    SHA1

    b99f8ded2fcb2ae5bd30cd98f99bbfa95cb49110

    SHA256

    cab5da73db1e3e9a65e68a9b3bac86322e2508a581f0de0b4e3e7fb66de066e7

    SHA512

    b829228605e2d278a0de1f368372db38a15cd3a632d0dbeb29c76cec98ec172d7be6796d34978080d82820e6f53ac7190e67b7409a18e925eb7fb6a619976b68

  • memory/752-21-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/1412-25-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/1412-30-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2396-17-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2396-19-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2396-27-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2396-28-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3488-14-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB