Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/02/2025, 00:57 UTC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_235138719883429e805b3fd05310326a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_235138719883429e805b3fd05310326a.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_235138719883429e805b3fd05310326a.exe
-
Size
329KB
-
MD5
235138719883429e805b3fd05310326a
-
SHA1
341de6cf3a38d8fe9cf1a1f3896d8741a83bf1ff
-
SHA256
cc94e513464e869cef5da4aa050de54fd8afaa879ea1ba545ac0a9a83e630a8c
-
SHA512
79925b81fab713cffd9e9609f4b7737f1d7b27e9240d8d788483e223b5b20d8b9837c1737708f702b4830b3dc06055aa25d24026b0cdf7197459af9fdd2baaa3
-
SSDEEP
6144:K4eZA+tMPSkR8Zbd+z6oxVr/d6bVdNKfiH/Og++H6oMdMYTyalG4:K4eZA+tMPSxZbd46GlmTOg++HKKYl
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 8 IoCs
resource yara_rule behavioral1/memory/1960-22-0x0000000000400000-0x0000000000449000-memory.dmp family_isrstealer behavioral1/memory/2456-21-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/2456-16-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/1960-10-0x0000000000400000-0x0000000000449000-memory.dmp family_isrstealer behavioral1/memory/1960-11-0x0000000000400000-0x0000000000449000-memory.dmp family_isrstealer behavioral1/memory/1960-8-0x0000000000400000-0x0000000000449000-memory.dmp family_isrstealer behavioral1/memory/2456-31-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/2456-32-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer -
Isrstealer family
-
Detected Nirsoft tools 2 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/2636-30-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/2636-33-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft -
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/2636-30-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/2636-33-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts JaffaCakes118_235138719883429e805b3fd05310326a.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1128 set thread context of 1960 1128 JaffaCakes118_235138719883429e805b3fd05310326a.exe 31 PID 1960 set thread context of 2456 1960 JaffaCakes118_235138719883429e805b3fd05310326a.exe 32 PID 2456 set thread context of 2392 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 33 PID 2456 set thread context of 2636 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 34 -
resource yara_rule behavioral1/memory/2636-28-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2636-30-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2636-29-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2636-26-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2636-33-0x0000000000400000-0x000000000041F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_235138719883429e805b3fd05310326a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_235138719883429e805b3fd05310326a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_235138719883429e805b3fd05310326a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_235138719883429e805b3fd05310326a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 1128 wrote to memory of 1960 1128 JaffaCakes118_235138719883429e805b3fd05310326a.exe 31 PID 1128 wrote to memory of 1960 1128 JaffaCakes118_235138719883429e805b3fd05310326a.exe 31 PID 1128 wrote to memory of 1960 1128 JaffaCakes118_235138719883429e805b3fd05310326a.exe 31 PID 1128 wrote to memory of 1960 1128 JaffaCakes118_235138719883429e805b3fd05310326a.exe 31 PID 1128 wrote to memory of 1960 1128 JaffaCakes118_235138719883429e805b3fd05310326a.exe 31 PID 1128 wrote to memory of 1960 1128 JaffaCakes118_235138719883429e805b3fd05310326a.exe 31 PID 1128 wrote to memory of 1960 1128 JaffaCakes118_235138719883429e805b3fd05310326a.exe 31 PID 1128 wrote to memory of 1960 1128 JaffaCakes118_235138719883429e805b3fd05310326a.exe 31 PID 1128 wrote to memory of 1960 1128 JaffaCakes118_235138719883429e805b3fd05310326a.exe 31 PID 1128 wrote to memory of 1960 1128 JaffaCakes118_235138719883429e805b3fd05310326a.exe 31 PID 1128 wrote to memory of 1960 1128 JaffaCakes118_235138719883429e805b3fd05310326a.exe 31 PID 1960 wrote to memory of 2456 1960 JaffaCakes118_235138719883429e805b3fd05310326a.exe 32 PID 1960 wrote to memory of 2456 1960 JaffaCakes118_235138719883429e805b3fd05310326a.exe 32 PID 1960 wrote to memory of 2456 1960 JaffaCakes118_235138719883429e805b3fd05310326a.exe 32 PID 1960 wrote to memory of 2456 1960 JaffaCakes118_235138719883429e805b3fd05310326a.exe 32 PID 1960 wrote to memory of 2456 1960 JaffaCakes118_235138719883429e805b3fd05310326a.exe 32 PID 1960 wrote to memory of 2456 1960 JaffaCakes118_235138719883429e805b3fd05310326a.exe 32 PID 1960 wrote to memory of 2456 1960 JaffaCakes118_235138719883429e805b3fd05310326a.exe 32 PID 1960 wrote to memory of 2456 1960 JaffaCakes118_235138719883429e805b3fd05310326a.exe 32 PID 2456 wrote to memory of 2392 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 33 PID 2456 wrote to memory of 2392 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 33 PID 2456 wrote to memory of 2392 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 33 PID 2456 wrote to memory of 2392 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 33 PID 2456 wrote to memory of 2392 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 33 PID 2456 wrote to memory of 2392 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 33 PID 2456 wrote to memory of 2392 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 33 PID 2456 wrote to memory of 2392 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 33 PID 2456 wrote to memory of 2392 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 33 PID 2456 wrote to memory of 2636 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 34 PID 2456 wrote to memory of 2636 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 34 PID 2456 wrote to memory of 2636 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 34 PID 2456 wrote to memory of 2636 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 34 PID 2456 wrote to memory of 2636 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 34 PID 2456 wrote to memory of 2636 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 34 PID 2456 wrote to memory of 2636 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 34 PID 2456 wrote to memory of 2636 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 34 PID 2456 wrote to memory of 2636 2456 JaffaCakes118_235138719883429e805b3fd05310326a.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_235138719883429e805b3fd05310326a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_235138719883429e805b3fd05310326a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_235138719883429e805b3fd05310326a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_235138719883429e805b3fd05310326a.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_235138719883429e805b3fd05310326a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_235138719883429e805b3fd05310326a.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_235138719883429e805b3fd05310326a.exe/scomma "C:\Users\Admin\AppData\Local\Temp\AUCWqzMLo5.ini"4⤵PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_235138719883429e805b3fd05310326a.exe/scomma "C:\Users\Admin\AppData\Local\Temp\egL30Q0drE.ini"4⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:2636
-
-
-