Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
5JaffaCakes...31.exe
windows7-x64
3JaffaCakes...31.exe
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ar.exe
windows7-x64
7$PLUGINSDI...ar.exe
windows10-2004-x64
3$PROGRAM_F...er.exe
windows7-x64
3$PROGRAM_F...er.exe
windows10-2004-x64
3$PROGRAM_F...ar.dll
windows7-x64
7$PROGRAM_F...ar.dll
windows10-2004-x64
7$PROGRAM_F...rX.dll
windows7-x64
7$PROGRAM_F...rX.dll
windows10-2004-x64
7$PROGRAM_F...er.exe
windows7-x64
3$PROGRAM_F...er.exe
windows10-2004-x64
3$PROGRAM_F...rc.dll
windows7-x64
3$PROGRAM_F...rc.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...pt.exe
windows7-x64
7$PLUGINSDI...pt.exe
windows10-2004-x64
7$PLUGINSDI...an.exe
windows7-x64
7$PLUGINSDI...an.exe
windows10-2004-x64
7$PLUGINSDI...an.exe
windows7-x64
7$PLUGINSDI...an.exe
windows10-2004-x64
7$PLUGINSDI...st.exe
windows7-x64
7$PLUGINSDI...st.exe
windows10-2004-x64
3$PLUGINSDIR/v9fft.exe
windows7-x64
10$PLUGINSDIR/v9fft.exe
windows10-2004-x64
10$TEMP/AskPIP_FF_.exe
windows7-x64
3$TEMP/AskPIP_FF_.exe
windows10-2004-x64
3$TEMP/AskT...IC.dll
windows7-x64
8$TEMP/AskT...IC.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/02/2025, 20:16
Behavioral task
behavioral1
Sample
JaffaCakes118_1501f2ea21bf8b38b5ad8bd8219bec31.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1501f2ea21bf8b38b5ad8bd8219bec31.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Baidu-TB-ASBar.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Baidu-TB-ASBar.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
$PROGRAM_FILES/Baidu/ASBarBroker.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PROGRAM_FILES/Baidu/ASBarBroker.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
$PROGRAM_FILES/Baidu/AddressBar.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
$PROGRAM_FILES/Baidu/AddressBar.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduBarX.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduBarX.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BarBroker.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BarBroker.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/rc.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/rc.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/hao123inst-egypt.exe
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/hao123inst-egypt.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/hao123inst-japan.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/hao123inst-japan.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/hao123inst-taiwan.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/hao123inst-taiwan.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/hao123inst.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/hao123inst.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/v9fft.exe
Resource
win7-20250207-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/v9fft.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
$TEMP/AskPIP_FF_.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$TEMP/AskPIP_FF_.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
$TEMP/AskToolbarTemp/ApnIC.dll
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
$TEMP/AskToolbarTemp/ApnIC.dll
Resource
win10v2004-20250217-en
General
-
Target
$PLUGINSDIR/hao123inst-japan.exe
-
Size
776KB
-
MD5
35216cfcfcdfd7c2df84804ed69fdcfd
-
SHA1
34d77a23aa7c7648948e4bfab31f33f517a785dc
-
SHA256
a2157e3cf367d84dac8847bf2f20d32e1a420ddf297d879fa06113e08f9fc6dd
-
SHA512
385d4b10c29c35b0b933f3dcf02e269e784f01e4836e6e1c9d60536cc7c30afb15bf5a70cfeaa4f2d1ec02e12c174d21c4924a02fabf3774f6f9834ca913a2c8
-
SSDEEP
24576:f1Du4E0/zuFrHQR0pFGFbPEZB4gbZTkz74gbZg:dDFzuEDEZB4gbZY34gbZg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3052 hao123.1.0.0.1100.exe -
Loads dropped DLL 5 IoCs
pid Process 2100 hao123inst-japan.exe 2100 hao123inst-japan.exe 2100 hao123inst-japan.exe 2100 hao123inst-japan.exe 2100 hao123inst-japan.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hao123inst-japan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hao123.1.0.0.1100.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main hao123inst-japan.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://jp.hao123.com/?tn=forf_hp_hao123_jp" hao123inst-japan.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2100 hao123inst-japan.exe 2100 hao123inst-japan.exe 3052 hao123.1.0.0.1100.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3052 2100 hao123inst-japan.exe 31 PID 2100 wrote to memory of 3052 2100 hao123inst-japan.exe 31 PID 2100 wrote to memory of 3052 2100 hao123inst-japan.exe 31 PID 2100 wrote to memory of 3052 2100 hao123inst-japan.exe 31 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21 PID 3052 wrote to memory of 1196 3052 hao123.1.0.0.1100.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hao123inst-japan.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hao123inst-japan.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Roaming\baidu\hao123-jp\hao123.1.0.0.1100.exefirst_exec_from_inst3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
944B
MD5cbe586c55fe6aa6ca030a1bdbba112a5
SHA186eef1be626d2036fc570b4aa8fa8adcc529c499
SHA256f08d0a7e7dec31f5d0e9dd99ae4c1f721d382610a5d6b6d5bdb39bca5a82c0ec
SHA5122cd5061906ca6577cc15ecced3944cb6da55d0eff542a42afe66d3e83277651e20e009ac9eea9befc4e082ea10ea60302c3cc4400f5200e97090dc440a06d438
-
Filesize
532KB
MD524084b3b7c98ee06e90b381511e93749
SHA1f8633cd3058205acfcc4473944b660f76874a11c
SHA2568ae85201b89c0f65c17dab19e78a4610ade2947899d46fded6513fa3a2b45b11
SHA512078f3be10735cd8818ec4babe4050224aae99d5f19cd8329cb29a40fcae86c4184502e559c763490fc93931b101efb40a053b4e9efba66138208520dd75eb709
-
Filesize
1002B
MD582716c0eee10f79367349adc5e4a3e5d
SHA1141e08d7073284ea7e51a2ac4a920797cba7ca25
SHA256709497d5e35b45c1efa021688e25a9f230829094187a16f46b94e4246e030e94
SHA512078ca78464e6a71fd0f7e002fae7c1efa4f189985a84e716fd131b619b8f117d00e5f99f755842fd0d4f039bf1b2f9344becdfe72231c3efa2de385197191da5