Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2025, 15:55
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_737185979857843bfb7af2a47d4736e6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_737185979857843bfb7af2a47d4736e6.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_737185979857843bfb7af2a47d4736e6.exe
-
Size
2.2MB
-
MD5
737185979857843bfb7af2a47d4736e6
-
SHA1
8a1f10e0ed58486b296693ba6923a67d7ef8bcfb
-
SHA256
10dc0b0c66da1120c8c61113d1be51a6142c07e8336e9aa0d6f8508392932bec
-
SHA512
cbc2a2361bc0fe8ba195f01b70eeda06d5366250c0147b43020e48627a565d76ebf75af8675b6f3c256f72421e89ebbe72bcabb05e335d07a9095d528a50445b
-
SSDEEP
49152:KULuIwA0osnnqXnnIHnJRlkAaOogN/7zksUPG6KKV3o9WAizTqn1wAninCoX8zn:K6uIwA0osnnqXnnIHnJT+5gNjxio4AiD
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
sinasaid
Signatures
-
Hawkeye family
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\Control Panel\International\Geo\Nation JaffaCakes118_737185979857843bfb7af2a47d4736e6.exe Key value queried \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\Control Panel\International\Geo\Nation rtmpltem.exe -
Deletes itself 1 IoCs
pid Process 4936 explorer.exe -
Executes dropped EXE 7 IoCs
pid Process 4936 explorer.exe 3400 explorer.exe 2176 rtmpltem.exe 1316 SimbaInstaller2.exe 384 vpltfrm.exe 1380 SimbaInstaller2.tmp 2436 Simba.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\© Microsoft Real Time Media Stack = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\rtmpltem.exe" rtmpltem.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4936 set thread context of 3400 4936 explorer.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SimbaInstaller2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpltfrm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SimbaInstaller2.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Simba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_737185979857843bfb7af2a47d4736e6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtmpltem.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Simba\DefaultIcon SimbaInstaller2.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Simba\DefaultIcon\ = "C:\\Simba\\Simba.exe,0" SimbaInstaller2.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Simba\shell\open\command SimbaInstaller2.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.simba SimbaInstaller2.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Simba SimbaInstaller2.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Simba\ = "Simba script" SimbaInstaller2.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Simba\shell SimbaInstaller2.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Simba\shell\open SimbaInstaller2.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Simba\shell\open\command\ = "\"C:\\Simba\\Simba.exe\" \"%1\"" SimbaInstaller2.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.simba\ = "Simba" SimbaInstaller2.tmp -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4936 explorer.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 3400 explorer.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 2176 rtmpltem.exe 4936 explorer.exe 384 vpltfrm.exe 2176 rtmpltem.exe 4936 explorer.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4892 JaffaCakes118_737185979857843bfb7af2a47d4736e6.exe Token: SeDebugPrivilege 4936 explorer.exe Token: SeDebugPrivilege 2176 rtmpltem.exe Token: SeDebugPrivilege 384 vpltfrm.exe Token: SeDebugPrivilege 3400 explorer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1380 SimbaInstaller2.tmp 2436 Simba.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2436 Simba.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3400 explorer.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4892 wrote to memory of 4936 4892 JaffaCakes118_737185979857843bfb7af2a47d4736e6.exe 86 PID 4892 wrote to memory of 4936 4892 JaffaCakes118_737185979857843bfb7af2a47d4736e6.exe 86 PID 4892 wrote to memory of 4936 4892 JaffaCakes118_737185979857843bfb7af2a47d4736e6.exe 86 PID 4936 wrote to memory of 3400 4936 explorer.exe 88 PID 4936 wrote to memory of 3400 4936 explorer.exe 88 PID 4936 wrote to memory of 3400 4936 explorer.exe 88 PID 4936 wrote to memory of 3400 4936 explorer.exe 88 PID 4936 wrote to memory of 3400 4936 explorer.exe 88 PID 4936 wrote to memory of 3400 4936 explorer.exe 88 PID 4936 wrote to memory of 3400 4936 explorer.exe 88 PID 4936 wrote to memory of 3400 4936 explorer.exe 88 PID 4936 wrote to memory of 2176 4936 explorer.exe 91 PID 4936 wrote to memory of 2176 4936 explorer.exe 91 PID 4936 wrote to memory of 2176 4936 explorer.exe 91 PID 3400 wrote to memory of 1316 3400 explorer.exe 92 PID 3400 wrote to memory of 1316 3400 explorer.exe 92 PID 3400 wrote to memory of 1316 3400 explorer.exe 92 PID 2176 wrote to memory of 384 2176 rtmpltem.exe 93 PID 2176 wrote to memory of 384 2176 rtmpltem.exe 93 PID 2176 wrote to memory of 384 2176 rtmpltem.exe 93 PID 1316 wrote to memory of 1380 1316 SimbaInstaller2.exe 94 PID 1316 wrote to memory of 1380 1316 SimbaInstaller2.exe 94 PID 1316 wrote to memory of 1380 1316 SimbaInstaller2.exe 94 PID 384 wrote to memory of 1500 384 vpltfrm.exe 95 PID 384 wrote to memory of 1500 384 vpltfrm.exe 95 PID 384 wrote to memory of 1500 384 vpltfrm.exe 95 PID 1380 wrote to memory of 2436 1380 SimbaInstaller2.tmp 99 PID 1380 wrote to memory of 2436 1380 SimbaInstaller2.tmp 99 PID 1380 wrote to memory of 2436 1380 SimbaInstaller2.tmp 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_737185979857843bfb7af2a47d4736e6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_737185979857843bfb7af2a47d4736e6.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\SimbaInstaller2.exe"C:\Users\Admin\AppData\Local\Temp\SimbaInstaller2.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\is-1PH58.tmp\SimbaInstaller2.tmp"C:\Users\Admin\AppData\Local\Temp\is-1PH58.tmp\SimbaInstaller2.tmp" /SL5="$502BC,1223502,54272,C:\Users\Admin\AppData\Local\Temp\SimbaInstaller2.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Simba\Simba.exe"C:\Simba\Simba.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2436
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\System\rtmpltem.exe"C:\Users\Admin\AppData\Local\Temp\System\rtmpltem.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\System\vpltfrm.exe"C:\Users\Admin\AppData\Local\Temp\System\vpltfrm.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\System\vpltfrm.exeC:\Users\Admin\AppData\Local\Temp\System\vpltfrm.exe5⤵PID:1500
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD53eb03028f227b12affdd4ff51f8cfc3a
SHA121f254714faed9af77dac7faf3b9730ade16ef3f
SHA256ccdf335821a1d7cdc68871d283c26206d3947fffdaf96eb1549d0a212a2ab279
SHA51215dd667254d8706f2418cef14e5f2999d11c7dd011dd8a971ff2443bd2f1379d46c971edfc2e5c98ef06c4d709a160f6fde8a8e00bb56738b5d4de95b146a803
-
Filesize
6KB
MD51f2b8d9c206ab940523a74debef36415
SHA1bad5a22b0ad7683711dd564ba5104573c4f2776a
SHA256e9451c18079689ed297e4d8884fffe0768fd84a6616f590bbf29babf023c4a9d
SHA512120f406925cd3f4f3a9774c2217b53c45dd70ea00e330a98930b3573cc5686c88bef06be0d6517cd1003725868e7f005dd23c676dd74d16fdc6ab173a3f1f383
-
Filesize
34KB
MD57154da585eaa748ddd279671070a70fa
SHA1fe77484977f1348e681e7ae14cece11d89695f23
SHA256b45e007534d60e85c6c12dfa84128d59334b344de7790aa83cf01f93e8834ab6
SHA512fcbf932b14ee3de2f411ea37405738cc1e953a067f8a7640e134409c2f7bfb3b886655c4274f931a3404ae031cfd7bde81cc695f75eb03f5e09908feb45408b1
-
Filesize
533B
MD547fd41357ca6047ac88c7c6a1d15d6ca
SHA10c561814a1613d633946f419b9a196ba11099284
SHA256986a4eb1ac6f0ce0d75999d31b9405e7409f6102cd49afc66ef05cc2ff4430c0
SHA51274477e55f3bf0c7d36b2d0532cd527c181281ea8cdc36c7b72851f88554b32a4424e532c64aeb36b4c398ac0a2eeee1d3894b04c26a83d49996f6856b4cc582b
-
Filesize
183B
MD585f5b61875ef377a1c6632665d0a9c03
SHA137a249b1b7710e95cf3c3fb3a1ae3a43cdc3cca1
SHA2560c797f2e3cc2fbd5ffb9717c3d2d154e50db81284ad604412bdbd9ba383de8fb
SHA512b7b0a9bf782a11e5346d73a7ca059b36201d0a30a3c502fae8475ddd7d79be2bab94931183dda791d2d36000ece35d662cea175578e3b56b5108939e42f27756
-
Filesize
15KB
MD5e45981d1d1f0823cfa6cf61a73e38c6e
SHA1b7b9b6bf558e4d6ca4e17bf0671204c1d18c813f
SHA2563bebf3e0945c4a8b85554120be1413372d839852b2a6c203f550943eb287aeba
SHA512fd6020909bf31183696c8da52e86211b3d9898c66a1266f26108ae3eb545bf323d48357ac1874b8161bf9ae0183d4ce4733e8650ed2bcdedb55872234945597c
-
Filesize
35KB
MD537896c646f2a02e2e41a28ee8afa28ed
SHA1bbc34aa0c7150fd4b6f547fabd7cfd02e6fc0227
SHA2564cb85ad8d41dc99cb80a01b774686f3eff6365aff311f6ffb8df1cadad1f53ad
SHA5124a69cb0b901e7ce64d2a03f19b17ba6e82bdcd1f069001a2c070fbe2e6c804b595e6e0c0daf58d69f0c74d40f40ee9907f49fd83bcfff50b0965f0c049f896c6
-
Filesize
3KB
MD5c5112834d8e22e87922d7d639931a310
SHA1c42fcd0e4fb155595b9399b2f83f10a8d111e2f4
SHA256828190f30c1450c64d3c823e311b791ad9f71a2cc42e031a9e57f003724e3890
SHA512c44a8706e8ce658f680283c9f3895bf280c51f81b079bbac7ee626153afd3b10c11caa1d3da329012ac1046532e86861043beb7502d316f51a24d02d095a8752
-
Filesize
4.6MB
MD50b344e90a438d635eb477addcdfb1e89
SHA159201b546981fd88676f8ab131ee16a849bc8990
SHA2568eb94d681e6ce4b4415d072e8e1b649f6d17b0db0cb7358d668b3b39068d12d4
SHA512f96a9263d05eb5e60ecd64f5b6d2daf903a020af5e0b539f957f15a1c318bb6e04fd56fee915a98f2a8b2dd945f0572b913c3d028c7b5a3c79414fda7aeadd95
-
Filesize
1KB
MD50194bd578a27e9de608a6ca0baf25a87
SHA13af07d8dac32e3632499a4f64e4fb375de376d8a
SHA256b4df5335c778de58dd48514f11f14439ded266bf61ef1d6d887111acc2acb15a
SHA5120e75fd9588697b42651600aa61e954b2eca6592413741965d9d1ec036f77758a5341859bb1da5b2c7611e277761a671c973dc84d5e7ed8d939d41a23bd88ee8e
-
Filesize
1.4MB
MD5228dda7510da10884cdf045e875a8a61
SHA1ad7d4613904805e0f69d47c0dfc3edb9bb056e77
SHA256fee474d6dbf4a0c50c27a8ea0c972209fc16bf6543c1c77db4c48ab9bcb4e280
SHA5120e395f9cf00eb086a3767a336c86e8410457f7ed87765dbb3f23ffb19721147af7f349232d24e74bf60d4dad4695e78a807c3dd343d6f2c91269a502ebb73c60
-
Filesize
84B
MD5de479f1ff2ef0439011f7fb63ed7495a
SHA18fde7292cced538289752fba2b9e1858959321d0
SHA256dad7e3876bc87d007d4ec0edf32e06a003401f24f293f2a3113a48a1f1446b75
SHA512ab336006f823e4d15793c106e40d06966425fa4eb90b33c209c9072f4fc0726477e57d746b8cd26ba787dde7c68899600abd11980533627f4346dea710dc74dd
-
Filesize
52KB
MD54777f65333a1f79b6eaa5eba507a855a
SHA1007e6756a99e86410c24f078b2edf21a9c302aa1
SHA2568a1fff36d4f7aac527918f7e8e7de942fec16ed0bc50d0a11ba11557d01a0be6
SHA51240ee3626d28f927fee786aa05729d61a3082a3fe5c5ce4f53a24cc65407f4470dc660bfe60099d6baaddb8a32fbf1755ea791e6283c1c1f0152f0840ddc9cdeb
-
Filesize
688KB
MD5c765336f0dcf4efdcc2101eed67cd30c
SHA1fa0279f59738c5aa3b6b20106e109ccd77f895a7
SHA256c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28
SHA51206a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891
-
Filesize
2.2MB
MD5737185979857843bfb7af2a47d4736e6
SHA18a1f10e0ed58486b296693ba6923a67d7ef8bcfb
SHA25610dc0b0c66da1120c8c61113d1be51a6142c07e8336e9aa0d6f8508392932bec
SHA512cbc2a2361bc0fe8ba195f01b70eeda06d5366250c0147b43020e48627a565d76ebf75af8675b6f3c256f72421e89ebbe72bcabb05e335d07a9095d528a50445b