Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2025, 15:55

General

  • Target

    JaffaCakes118_737185979857843bfb7af2a47d4736e6.exe

  • Size

    2.2MB

  • MD5

    737185979857843bfb7af2a47d4736e6

  • SHA1

    8a1f10e0ed58486b296693ba6923a67d7ef8bcfb

  • SHA256

    10dc0b0c66da1120c8c61113d1be51a6142c07e8336e9aa0d6f8508392932bec

  • SHA512

    cbc2a2361bc0fe8ba195f01b70eeda06d5366250c0147b43020e48627a565d76ebf75af8675b6f3c256f72421e89ebbe72bcabb05e335d07a9095d528a50445b

  • SSDEEP

    49152:KULuIwA0osnnqXnnIHnJRlkAaOogN/7zksUPG6KKV3o9WAizTqn1wAninCoX8zn:K6uIwA0osnnqXnnIHnJT+5gNjxio4AiD

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    sinasaid

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Hawkeye family
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_737185979857843bfb7af2a47d4736e6.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_737185979857843bfb7af2a47d4736e6.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4936
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3400
        • C:\Users\Admin\AppData\Local\Temp\SimbaInstaller2.exe
          "C:\Users\Admin\AppData\Local\Temp\SimbaInstaller2.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1316
          • C:\Users\Admin\AppData\Local\Temp\is-1PH58.tmp\SimbaInstaller2.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-1PH58.tmp\SimbaInstaller2.tmp" /SL5="$502BC,1223502,54272,C:\Users\Admin\AppData\Local\Temp\SimbaInstaller2.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:1380
            • C:\Simba\Simba.exe
              "C:\Simba\Simba.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:2436
      • C:\Users\Admin\AppData\Local\Temp\System\rtmpltem.exe
        "C:\Users\Admin\AppData\Local\Temp\System\rtmpltem.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2176
        • C:\Users\Admin\AppData\Local\Temp\System\vpltfrm.exe
          "C:\Users\Admin\AppData\Local\Temp\System\vpltfrm.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:384
          • C:\Users\Admin\AppData\Local\Temp\System\vpltfrm.exe
            C:\Users\Admin\AppData\Local\Temp\System\vpltfrm.exe
            5⤵
              PID:1500

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Simba\Extensions\CRov.sex

      Filesize

      10KB

      MD5

      3eb03028f227b12affdd4ff51f8cfc3a

      SHA1

      21f254714faed9af77dac7faf3b9730ade16ef3f

      SHA256

      ccdf335821a1d7cdc68871d283c26206d3947fffdaf96eb1549d0a212a2ab279

      SHA512

      15dd667254d8706f2418cef14e5f2999d11c7dd011dd8a971ff2443bd2f1379d46c971edfc2e5c98ef06c4d709a160f6fde8a8e00bb56738b5d4de95b146a803

    • C:\Simba\Extensions\associate.sex

      Filesize

      6KB

      MD5

      1f2b8d9c206ab940523a74debef36415

      SHA1

      bad5a22b0ad7683711dd564ba5104573c4f2776a

      SHA256

      e9451c18079689ed297e4d8884fffe0768fd84a6616f590bbf29babf023c4a9d

      SHA512

      120f406925cd3f4f3a9774c2217b53c45dd70ea00e330a98930b3573cc5686c88bef06be0d6517cd1003725868e7f005dd23c676dd74d16fdc6ab173a3f1f383

    • C:\Simba\Extensions\dtm_editor.sex

      Filesize

      34KB

      MD5

      7154da585eaa748ddd279671070a70fa

      SHA1

      fe77484977f1348e681e7ae14cece11d89695f23

      SHA256

      b45e007534d60e85c6c12dfa84128d59334b344de7790aa83cf01f93e8834ab6

      SHA512

      fcbf932b14ee3de2f411ea37405738cc1e953a067f8a7640e134409c2f7bfb3b886655c4274f931a3404ae031cfd7bde81cc695f75eb03f5e09908feb45408b1

    • C:\Simba\Extensions\extension.sex

      Filesize

      533B

      MD5

      47fd41357ca6047ac88c7c6a1d15d6ca

      SHA1

      0c561814a1613d633946f419b9a196ba11099284

      SHA256

      986a4eb1ac6f0ce0d75999d31b9405e7409f6102cd49afc66ef05cc2ff4430c0

      SHA512

      74477e55f3bf0c7d36b2d0532cd527c181281ea8cdc36c7b72851f88554b32a4424e532c64aeb36b4c398ac0a2eeee1d3894b04c26a83d49996f6856b4cc582b

    • C:\Simba\Extensions\msi.sex

      Filesize

      183B

      MD5

      85f5b61875ef377a1c6632665d0a9c03

      SHA1

      37a249b1b7710e95cf3c3fb3a1ae3a43cdc3cca1

      SHA256

      0c797f2e3cc2fbd5ffb9717c3d2d154e50db81284ad604412bdbd9ba383de8fb

      SHA512

      b7b0a9bf782a11e5346d73a7ca059b36201d0a30a3c502fae8475ddd7d79be2bab94931183dda791d2d36000ece35d662cea175578e3b56b5108939e42f27756

    • C:\Simba\Extensions\paster.sex

      Filesize

      15KB

      MD5

      e45981d1d1f0823cfa6cf61a73e38c6e

      SHA1

      b7b9b6bf558e4d6ca4e17bf0671204c1d18c813f

      SHA256

      3bebf3e0945c4a8b85554120be1413372d839852b2a6c203f550943eb287aeba

      SHA512

      fd6020909bf31183696c8da52e86211b3d9898c66a1266f26108ae3eb545bf323d48357ac1874b8161bf9ae0183d4ce4733e8650ed2bcdedb55872234945597c

    • C:\Simba\Extensions\security.sex

      Filesize

      35KB

      MD5

      37896c646f2a02e2e41a28ee8afa28ed

      SHA1

      bbc34aa0c7150fd4b6f547fabd7cfd02e6fc0227

      SHA256

      4cb85ad8d41dc99cb80a01b774686f3eff6365aff311f6ffb8df1cadad1f53ad

      SHA512

      4a69cb0b901e7ce64d2a03f19b17ba6e82bdcd1f069001a2c070fbe2e6c804b595e6e0c0daf58d69f0c74d40f40ee9907f49fd83bcfff50b0965f0c049f896c6

    • C:\Simba\Extensions\srl.sex

      Filesize

      3KB

      MD5

      c5112834d8e22e87922d7d639931a310

      SHA1

      c42fcd0e4fb155595b9399b2f83f10a8d111e2f4

      SHA256

      828190f30c1450c64d3c823e311b791ad9f71a2cc42e031a9e57f003724e3890

      SHA512

      c44a8706e8ce658f680283c9f3895bf280c51f81b079bbac7ee626153afd3b10c11caa1d3da329012ac1046532e86861043beb7502d316f51a24d02d095a8752

    • C:\Simba\Simba.exe

      Filesize

      4.6MB

      MD5

      0b344e90a438d635eb477addcdfb1e89

      SHA1

      59201b546981fd88676f8ab131ee16a849bc8990

      SHA256

      8eb94d681e6ce4b4415d072e8e1b649f6d17b0db0cb7358d668b3b39068d12d4

      SHA512

      f96a9263d05eb5e60ecd64f5b6d2daf903a020af5e0b539f957f15a1c318bb6e04fd56fee915a98f2a8b2dd945f0572b913c3d028c7b5a3c79414fda7aeadd95

    • C:\Simba\settings.xml

      Filesize

      1KB

      MD5

      0194bd578a27e9de608a6ca0baf25a87

      SHA1

      3af07d8dac32e3632499a4f64e4fb375de376d8a

      SHA256

      b4df5335c778de58dd48514f11f14439ded266bf61ef1d6d887111acc2acb15a

      SHA512

      0e75fd9588697b42651600aa61e954b2eca6592413741965d9d1ec036f77758a5341859bb1da5b2c7611e277761a671c973dc84d5e7ed8d939d41a23bd88ee8e

    • C:\Users\Admin\AppData\Local\Temp\SimbaInstaller2.exe

      Filesize

      1.4MB

      MD5

      228dda7510da10884cdf045e875a8a61

      SHA1

      ad7d4613904805e0f69d47c0dfc3edb9bb056e77

      SHA256

      fee474d6dbf4a0c50c27a8ea0c972209fc16bf6543c1c77db4c48ab9bcb4e280

      SHA512

      0e395f9cf00eb086a3767a336c86e8410457f7ed87765dbb3f23ffb19721147af7f349232d24e74bf60d4dad4695e78a807c3dd343d6f2c91269a502ebb73c60

    • C:\Users\Admin\AppData\Local\Temp\SysInfo.txt

      Filesize

      84B

      MD5

      de479f1ff2ef0439011f7fb63ed7495a

      SHA1

      8fde7292cced538289752fba2b9e1858959321d0

      SHA256

      dad7e3876bc87d007d4ec0edf32e06a003401f24f293f2a3113a48a1f1446b75

      SHA512

      ab336006f823e4d15793c106e40d06966425fa4eb90b33c209c9072f4fc0726477e57d746b8cd26ba787dde7c68899600abd11980533627f4346dea710dc74dd

    • C:\Users\Admin\AppData\Local\Temp\System\rtmpltem.exe

      Filesize

      52KB

      MD5

      4777f65333a1f79b6eaa5eba507a855a

      SHA1

      007e6756a99e86410c24f078b2edf21a9c302aa1

      SHA256

      8a1fff36d4f7aac527918f7e8e7de942fec16ed0bc50d0a11ba11557d01a0be6

      SHA512

      40ee3626d28f927fee786aa05729d61a3082a3fe5c5ce4f53a24cc65407f4470dc660bfe60099d6baaddb8a32fbf1755ea791e6283c1c1f0152f0840ddc9cdeb

    • C:\Users\Admin\AppData\Local\Temp\is-1PH58.tmp\SimbaInstaller2.tmp

      Filesize

      688KB

      MD5

      c765336f0dcf4efdcc2101eed67cd30c

      SHA1

      fa0279f59738c5aa3b6b20106e109ccd77f895a7

      SHA256

      c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28

      SHA512

      06a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe

      Filesize

      2.2MB

      MD5

      737185979857843bfb7af2a47d4736e6

      SHA1

      8a1f10e0ed58486b296693ba6923a67d7ef8bcfb

      SHA256

      10dc0b0c66da1120c8c61113d1be51a6142c07e8336e9aa0d6f8508392932bec

      SHA512

      cbc2a2361bc0fe8ba195f01b70eeda06d5366250c0147b43020e48627a565d76ebf75af8675b6f3c256f72421e89ebbe72bcabb05e335d07a9095d528a50445b

    • memory/1316-64-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/1316-47-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/1316-111-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/1380-65-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/1380-67-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/1380-103-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/1380-110-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/2436-159-0x0000000000400000-0x00000000008F8000-memory.dmp

      Filesize

      5.0MB

    • memory/2436-176-0x0000000000400000-0x00000000008F8000-memory.dmp

      Filesize

      5.0MB

    • memory/2436-172-0x0000000000400000-0x00000000008F8000-memory.dmp

      Filesize

      5.0MB

    • memory/3400-23-0x0000000074950000-0x0000000074F01000-memory.dmp

      Filesize

      5.7MB

    • memory/3400-24-0x0000000074950000-0x0000000074F01000-memory.dmp

      Filesize

      5.7MB

    • memory/3400-21-0x0000000000400000-0x0000000000612000-memory.dmp

      Filesize

      2.1MB

    • memory/3400-25-0x0000000074950000-0x0000000074F01000-memory.dmp

      Filesize

      5.7MB

    • memory/3400-63-0x0000000074950000-0x0000000074F01000-memory.dmp

      Filesize

      5.7MB

    • memory/4892-0-0x0000000074952000-0x0000000074953000-memory.dmp

      Filesize

      4KB

    • memory/4892-13-0x0000000074950000-0x0000000074F01000-memory.dmp

      Filesize

      5.7MB

    • memory/4892-2-0x0000000074950000-0x0000000074F01000-memory.dmp

      Filesize

      5.7MB

    • memory/4892-1-0x0000000074950000-0x0000000074F01000-memory.dmp

      Filesize

      5.7MB

    • memory/4936-15-0x0000000074950000-0x0000000074F01000-memory.dmp

      Filesize

      5.7MB

    • memory/4936-14-0x0000000074950000-0x0000000074F01000-memory.dmp

      Filesize

      5.7MB

    • memory/4936-62-0x0000000074950000-0x0000000074F01000-memory.dmp

      Filesize

      5.7MB