Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    80s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2025, 15:55

General

  • Target

    JaffaCakes118_737185979857843bfb7af2a47d4736e6.exe

  • Size

    2.2MB

  • MD5

    737185979857843bfb7af2a47d4736e6

  • SHA1

    8a1f10e0ed58486b296693ba6923a67d7ef8bcfb

  • SHA256

    10dc0b0c66da1120c8c61113d1be51a6142c07e8336e9aa0d6f8508392932bec

  • SHA512

    cbc2a2361bc0fe8ba195f01b70eeda06d5366250c0147b43020e48627a565d76ebf75af8675b6f3c256f72421e89ebbe72bcabb05e335d07a9095d528a50445b

  • SSDEEP

    49152:KULuIwA0osnnqXnnIHnJRlkAaOogN/7zksUPG6KKV3o9WAizTqn1wAninCoX8zn:K6uIwA0osnnqXnnIHnJT+5gNjxio4AiD

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    sinasaid

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Hawkeye family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 14 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_737185979857843bfb7af2a47d4736e6.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_737185979857843bfb7af2a47d4736e6.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
        3⤵
          PID:2824
        • C:\Users\Admin\AppData\Local\Temp\System\rtmpltem.exe
          "C:\Users\Admin\AppData\Local\Temp\System\rtmpltem.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2920
          • C:\Users\Admin\AppData\Local\Temp\System\vpltfrm.exe
            "C:\Users\Admin\AppData\Local\Temp\System\vpltfrm.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2860
            • C:\Users\Admin\AppData\Local\Temp\System\vpltfrm.exe
              C:\Users\Admin\AppData\Local\Temp\System\vpltfrm.exe
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2892
              • C:\Users\Admin\AppData\Local\Temp\SimbaInstaller2.exe
                "C:\Users\Admin\AppData\Local\Temp\SimbaInstaller2.exe"
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2648
                • C:\Users\Admin\AppData\Local\Temp\is-1PD67.tmp\SimbaInstaller2.tmp
                  "C:\Users\Admin\AppData\Local\Temp\is-1PD67.tmp\SimbaInstaller2.tmp" /SL5="$601DE,1223502,54272,C:\Users\Admin\AppData\Local\Temp\SimbaInstaller2.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of WriteProcessMemory
                  PID:2764
                  • C:\Simba\Simba.exe
                    "C:\Simba\Simba.exe"
                    8⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:2536

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Simba\Extensions\CRov.sex

      Filesize

      10KB

      MD5

      3eb03028f227b12affdd4ff51f8cfc3a

      SHA1

      21f254714faed9af77dac7faf3b9730ade16ef3f

      SHA256

      ccdf335821a1d7cdc68871d283c26206d3947fffdaf96eb1549d0a212a2ab279

      SHA512

      15dd667254d8706f2418cef14e5f2999d11c7dd011dd8a971ff2443bd2f1379d46c971edfc2e5c98ef06c4d709a160f6fde8a8e00bb56738b5d4de95b146a803

    • C:\Simba\Extensions\associate.sex

      Filesize

      6KB

      MD5

      1f2b8d9c206ab940523a74debef36415

      SHA1

      bad5a22b0ad7683711dd564ba5104573c4f2776a

      SHA256

      e9451c18079689ed297e4d8884fffe0768fd84a6616f590bbf29babf023c4a9d

      SHA512

      120f406925cd3f4f3a9774c2217b53c45dd70ea00e330a98930b3573cc5686c88bef06be0d6517cd1003725868e7f005dd23c676dd74d16fdc6ab173a3f1f383

    • C:\Simba\Extensions\dtm_editor.sex

      Filesize

      34KB

      MD5

      7154da585eaa748ddd279671070a70fa

      SHA1

      fe77484977f1348e681e7ae14cece11d89695f23

      SHA256

      b45e007534d60e85c6c12dfa84128d59334b344de7790aa83cf01f93e8834ab6

      SHA512

      fcbf932b14ee3de2f411ea37405738cc1e953a067f8a7640e134409c2f7bfb3b886655c4274f931a3404ae031cfd7bde81cc695f75eb03f5e09908feb45408b1

    • C:\Simba\Extensions\extension.sex

      Filesize

      533B

      MD5

      47fd41357ca6047ac88c7c6a1d15d6ca

      SHA1

      0c561814a1613d633946f419b9a196ba11099284

      SHA256

      986a4eb1ac6f0ce0d75999d31b9405e7409f6102cd49afc66ef05cc2ff4430c0

      SHA512

      74477e55f3bf0c7d36b2d0532cd527c181281ea8cdc36c7b72851f88554b32a4424e532c64aeb36b4c398ac0a2eeee1d3894b04c26a83d49996f6856b4cc582b

    • C:\Simba\Extensions\msi.sex

      Filesize

      183B

      MD5

      85f5b61875ef377a1c6632665d0a9c03

      SHA1

      37a249b1b7710e95cf3c3fb3a1ae3a43cdc3cca1

      SHA256

      0c797f2e3cc2fbd5ffb9717c3d2d154e50db81284ad604412bdbd9ba383de8fb

      SHA512

      b7b0a9bf782a11e5346d73a7ca059b36201d0a30a3c502fae8475ddd7d79be2bab94931183dda791d2d36000ece35d662cea175578e3b56b5108939e42f27756

    • C:\Simba\Extensions\paster.sex

      Filesize

      15KB

      MD5

      e45981d1d1f0823cfa6cf61a73e38c6e

      SHA1

      b7b9b6bf558e4d6ca4e17bf0671204c1d18c813f

      SHA256

      3bebf3e0945c4a8b85554120be1413372d839852b2a6c203f550943eb287aeba

      SHA512

      fd6020909bf31183696c8da52e86211b3d9898c66a1266f26108ae3eb545bf323d48357ac1874b8161bf9ae0183d4ce4733e8650ed2bcdedb55872234945597c

    • C:\Simba\Extensions\security.sex

      Filesize

      35KB

      MD5

      37896c646f2a02e2e41a28ee8afa28ed

      SHA1

      bbc34aa0c7150fd4b6f547fabd7cfd02e6fc0227

      SHA256

      4cb85ad8d41dc99cb80a01b774686f3eff6365aff311f6ffb8df1cadad1f53ad

      SHA512

      4a69cb0b901e7ce64d2a03f19b17ba6e82bdcd1f069001a2c070fbe2e6c804b595e6e0c0daf58d69f0c74d40f40ee9907f49fd83bcfff50b0965f0c049f896c6

    • C:\Simba\Extensions\srl.sex

      Filesize

      3KB

      MD5

      c5112834d8e22e87922d7d639931a310

      SHA1

      c42fcd0e4fb155595b9399b2f83f10a8d111e2f4

      SHA256

      828190f30c1450c64d3c823e311b791ad9f71a2cc42e031a9e57f003724e3890

      SHA512

      c44a8706e8ce658f680283c9f3895bf280c51f81b079bbac7ee626153afd3b10c11caa1d3da329012ac1046532e86861043beb7502d316f51a24d02d095a8752

    • C:\Simba\settings.xml

      Filesize

      467B

      MD5

      5f5f3f922e64817fb91b0e78278545bc

      SHA1

      8332ad78ed1176a2bb1400582efd8c6792e07a58

      SHA256

      76e13fb13ab40cd84c27a6378211d7a67d2cd18df661b13dbc0395762cf34f81

      SHA512

      2962838a06dc33c606936bbb3ad44857567e3238d0026277fc1db1d0e0c2d75e69f2324fc1706f958f4e55282ee5724553eb6bf3a3c8bb36e83a1daec17a3b76

    • C:\Simba\settings.xml

      Filesize

      766B

      MD5

      a1c2a36feb15242cff84e0fdcfda17ce

      SHA1

      598a87ce94eef57743606a5889c6ae893cfcbe23

      SHA256

      113f4c3661283174e7078e477166e7e32755346be6282d1c558b656ac3ad1f98

      SHA512

      bc181c538a2b5f3b432beaac4c55a3ffdd7842174e899d82923ff5b2a1c6d2e49573078938eb6fc71892f98d20a16668de4483e28849f64244e9f78a565452fd

    • C:\Users\Admin\AppData\Local\Temp\SysInfo.txt

      Filesize

      84B

      MD5

      de479f1ff2ef0439011f7fb63ed7495a

      SHA1

      8fde7292cced538289752fba2b9e1858959321d0

      SHA256

      dad7e3876bc87d007d4ec0edf32e06a003401f24f293f2a3113a48a1f1446b75

      SHA512

      ab336006f823e4d15793c106e40d06966425fa4eb90b33c209c9072f4fc0726477e57d746b8cd26ba787dde7c68899600abd11980533627f4346dea710dc74dd

    • \Simba\Simba.exe

      Filesize

      4.6MB

      MD5

      0b344e90a438d635eb477addcdfb1e89

      SHA1

      59201b546981fd88676f8ab131ee16a849bc8990

      SHA256

      8eb94d681e6ce4b4415d072e8e1b649f6d17b0db0cb7358d668b3b39068d12d4

      SHA512

      f96a9263d05eb5e60ecd64f5b6d2daf903a020af5e0b539f957f15a1c318bb6e04fd56fee915a98f2a8b2dd945f0572b913c3d028c7b5a3c79414fda7aeadd95

    • \Simba\unins000.exe

      Filesize

      698KB

      MD5

      c0526c103c768e515c85285986dcbc34

      SHA1

      e1a5c2349e7d331d5751d4ad80da39fb5bd732f4

      SHA256

      eb7446d5e163a35e12816cb0ae3e9571a0ea546276e9b34ae6460a2aec727933

      SHA512

      83bd75d3e6ad89aa1b767083c68119bb3ab3392c87e613c92684a10882440ec3df0b0623167ad47d21bba4d049567d3a058e63aed9172818501e2e96c26127cf

    • \Users\Admin\AppData\Local\Temp\SimbaInstaller2.exe

      Filesize

      1.4MB

      MD5

      228dda7510da10884cdf045e875a8a61

      SHA1

      ad7d4613904805e0f69d47c0dfc3edb9bb056e77

      SHA256

      fee474d6dbf4a0c50c27a8ea0c972209fc16bf6543c1c77db4c48ab9bcb4e280

      SHA512

      0e395f9cf00eb086a3767a336c86e8410457f7ed87765dbb3f23ffb19721147af7f349232d24e74bf60d4dad4695e78a807c3dd343d6f2c91269a502ebb73c60

    • \Users\Admin\AppData\Local\Temp\System\rtmpltem.exe

      Filesize

      52KB

      MD5

      4777f65333a1f79b6eaa5eba507a855a

      SHA1

      007e6756a99e86410c24f078b2edf21a9c302aa1

      SHA256

      8a1fff36d4f7aac527918f7e8e7de942fec16ed0bc50d0a11ba11557d01a0be6

      SHA512

      40ee3626d28f927fee786aa05729d61a3082a3fe5c5ce4f53a24cc65407f4470dc660bfe60099d6baaddb8a32fbf1755ea791e6283c1c1f0152f0840ddc9cdeb

    • \Users\Admin\AppData\Local\Temp\is-1PD67.tmp\SimbaInstaller2.tmp

      Filesize

      688KB

      MD5

      c765336f0dcf4efdcc2101eed67cd30c

      SHA1

      fa0279f59738c5aa3b6b20106e109ccd77f895a7

      SHA256

      c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28

      SHA512

      06a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891

    • \Users\Admin\AppData\Local\Temp\is-A95OD.tmp\_isetup\_shfoldr.dll

      Filesize

      22KB

      MD5

      92dc6ef532fbb4a5c3201469a5b5eb63

      SHA1

      3e89ff837147c16b4e41c30d6c796374e0b8e62c

      SHA256

      9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

      SHA512

      9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe

      Filesize

      2.2MB

      MD5

      737185979857843bfb7af2a47d4736e6

      SHA1

      8a1f10e0ed58486b296693ba6923a67d7ef8bcfb

      SHA256

      10dc0b0c66da1120c8c61113d1be51a6142c07e8336e9aa0d6f8508392932bec

      SHA512

      cbc2a2361bc0fe8ba195f01b70eeda06d5366250c0147b43020e48627a565d76ebf75af8675b6f3c256f72421e89ebbe72bcabb05e335d07a9095d528a50445b

    • memory/1952-70-0x00000000745B0000-0x0000000074B5B000-memory.dmp

      Filesize

      5.7MB

    • memory/1952-16-0x00000000745B0000-0x0000000074B5B000-memory.dmp

      Filesize

      5.7MB

    • memory/1952-15-0x00000000745B0000-0x0000000074B5B000-memory.dmp

      Filesize

      5.7MB

    • memory/2396-2-0x00000000745B0000-0x0000000074B5B000-memory.dmp

      Filesize

      5.7MB

    • memory/2396-1-0x00000000745B0000-0x0000000074B5B000-memory.dmp

      Filesize

      5.7MB

    • memory/2396-0-0x00000000745B1000-0x00000000745B2000-memory.dmp

      Filesize

      4KB

    • memory/2396-14-0x00000000745B0000-0x0000000074B5B000-memory.dmp

      Filesize

      5.7MB

    • memory/2536-183-0x0000000000400000-0x00000000008F8000-memory.dmp

      Filesize

      5.0MB

    • memory/2536-169-0x0000000000400000-0x00000000008F8000-memory.dmp

      Filesize

      5.0MB

    • memory/2536-187-0x0000000000400000-0x00000000008F8000-memory.dmp

      Filesize

      5.0MB

    • memory/2648-71-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/2648-121-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/2648-54-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/2764-72-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/2764-120-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/2764-76-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/2764-74-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/2892-47-0x0000000000400000-0x0000000000612000-memory.dmp

      Filesize

      2.1MB

    • memory/2892-37-0x0000000000400000-0x0000000000612000-memory.dmp

      Filesize

      2.1MB

    • memory/2892-42-0x0000000000400000-0x0000000000612000-memory.dmp

      Filesize

      2.1MB

    • memory/2892-41-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2892-39-0x0000000000400000-0x0000000000612000-memory.dmp

      Filesize

      2.1MB

    • memory/2892-38-0x0000000000400000-0x0000000000612000-memory.dmp

      Filesize

      2.1MB

    • memory/2892-40-0x0000000000400000-0x0000000000612000-memory.dmp

      Filesize

      2.1MB

    • memory/2892-45-0x0000000000400000-0x0000000000612000-memory.dmp

      Filesize

      2.1MB