Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
5JaffaCakes...31.exe
windows7-x64
3JaffaCakes...31.exe
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ar.exe
windows7-x64
7$PLUGINSDI...ar.exe
windows10-2004-x64
3$PROGRAM_F...er.exe
windows7-x64
3$PROGRAM_F...er.exe
windows10-2004-x64
3$PROGRAM_F...ar.dll
windows7-x64
7$PROGRAM_F...ar.dll
windows10-2004-x64
7$PROGRAM_F...rX.dll
windows7-x64
7$PROGRAM_F...rX.dll
windows10-2004-x64
7$PROGRAM_F...er.exe
windows7-x64
3$PROGRAM_F...er.exe
windows10-2004-x64
3$PROGRAM_F...rc.dll
windows7-x64
3$PROGRAM_F...rc.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...pt.exe
windows7-x64
7$PLUGINSDI...pt.exe
windows10-2004-x64
7$PLUGINSDI...an.exe
windows7-x64
7$PLUGINSDI...an.exe
windows10-2004-x64
7$PLUGINSDI...an.exe
windows7-x64
7$PLUGINSDI...an.exe
windows10-2004-x64
7$PLUGINSDI...st.exe
windows7-x64
7$PLUGINSDI...st.exe
windows10-2004-x64
3$PLUGINSDIR/v9fft.exe
windows7-x64
10$PLUGINSDIR/v9fft.exe
windows10-2004-x64
10$TEMP/AskPIP_FF_.exe
windows7-x64
3$TEMP/AskPIP_FF_.exe
windows10-2004-x64
3$TEMP/AskT...IC.dll
windows7-x64
8$TEMP/AskT...IC.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21/02/2025, 20:16
Behavioral task
behavioral1
Sample
JaffaCakes118_1501f2ea21bf8b38b5ad8bd8219bec31.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1501f2ea21bf8b38b5ad8bd8219bec31.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Baidu-TB-ASBar.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Baidu-TB-ASBar.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
$PROGRAM_FILES/Baidu/ASBarBroker.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PROGRAM_FILES/Baidu/ASBarBroker.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
$PROGRAM_FILES/Baidu/AddressBar.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
$PROGRAM_FILES/Baidu/AddressBar.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduBarX.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduBarX.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BarBroker.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BarBroker.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/rc.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/rc.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/hao123inst-egypt.exe
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/hao123inst-egypt.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/hao123inst-japan.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/hao123inst-japan.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/hao123inst-taiwan.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/hao123inst-taiwan.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/hao123inst.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/hao123inst.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/v9fft.exe
Resource
win7-20250207-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/v9fft.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
$TEMP/AskPIP_FF_.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$TEMP/AskPIP_FF_.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
$TEMP/AskToolbarTemp/ApnIC.dll
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
$TEMP/AskToolbarTemp/ApnIC.dll
Resource
win10v2004-20250217-en
General
-
Target
$PLUGINSDIR/hao123inst-egypt.exe
-
Size
1.2MB
-
MD5
c1392f10fbeafb4c15693add92e92961
-
SHA1
24eacadaf8910146b00a3b6146fad19e11bff03b
-
SHA256
051af720d19a480a6e54beadcf3947ec08ac555bdff69a477478ecfe97ba0ba0
-
SHA512
a41a3a2681861af7b06c6ead0c8a5b73210d72d6cfc283ac1c9316a3205f47192a6c737a33ff9c44c554b4ff95b68474cf9fa5e28df1c531fb5cd7337816c353
-
SSDEEP
24576:Z/vxuUOf5Hl2lHwJ4PEZB4gbZLPEZo74gbZm:ZHqf55IEZB4gbZzEZC4gbZm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 572 hao123.1.0.0.1103.exe -
Loads dropped DLL 6 IoCs
pid Process 2828 hao123inst-egypt.exe 2828 hao123inst-egypt.exe 2828 hao123inst-egypt.exe 2828 hao123inst-egypt.exe 2828 hao123inst-egypt.exe 2828 hao123inst-egypt.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hao123.1.0.0.1103.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hao123inst-egypt.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main hao123inst-egypt.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://ar.hao123.com/?tn=forf_hp_hao123_ar" hao123inst-egypt.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2828 hao123inst-egypt.exe 2828 hao123inst-egypt.exe 572 hao123.1.0.0.1103.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2828 wrote to memory of 572 2828 hao123inst-egypt.exe 31 PID 2828 wrote to memory of 572 2828 hao123inst-egypt.exe 31 PID 2828 wrote to memory of 572 2828 hao123inst-egypt.exe 31 PID 2828 wrote to memory of 572 2828 hao123inst-egypt.exe 31 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21 PID 572 wrote to memory of 1248 572 hao123.1.0.0.1103.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hao123inst-egypt.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hao123inst-egypt.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Roaming\baidu\hao123-ar\hao123.1.0.0.1103.exefirst_exec_from_inst3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
944B
MD51bca5b1edba8f9bd4ffb794e81d30621
SHA1de98a609115624962c9696b98f6cb2c56232007c
SHA2566abf566b9024bcf1d52e33e0f8269b317284866488f11abe21adf91315b562da
SHA512036c7b0cb16e99e8e59738259a5f8eedddcaf797fe8a4b72ce473cc0a7f1468d1c85109ec09b975776156a5629d8b9fbab56a3954d450f387a0f6262bc2a4113
-
Filesize
992B
MD530a48520887f0aaceebfc5093c153437
SHA1ce035b41c9837701f54844c69f620c68c940007b
SHA2567cb4827777ad30c921a00b9beaefe3851aa1128f7fd910a90d66deef159364d8
SHA512e0176784ab319a0d91159b74dfd46b2c1e8b82a18cc85422bd2af3a00d8013dfdb14f63f4a5bc1ac581eb1d3681914e655b73574ac67bc2b09fd5d22d043ba9f
-
Filesize
540KB
MD536d4f7773dae56f5cf766030256db486
SHA183172271d09bf1ed1b392063e7d0b475ea3a7ca0
SHA25681a787620af1fe74f0a2612b113a4604f92525bac24c88fc2637260ea9ae6739
SHA5128c538c3d4e6205dda2f53b8037c1d37d1893a8931155af5bb1bbec4fa9fa4b78aea05c3adff1b036dadfccf8ea9252c195920756a43062c2e8426c5b3a219af9