Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/02/2025, 00:57 UTC

General

  • Target

    JaffaCakes118_235138719883429e805b3fd05310326a.exe

  • Size

    329KB

  • MD5

    235138719883429e805b3fd05310326a

  • SHA1

    341de6cf3a38d8fe9cf1a1f3896d8741a83bf1ff

  • SHA256

    cc94e513464e869cef5da4aa050de54fd8afaa879ea1ba545ac0a9a83e630a8c

  • SHA512

    79925b81fab713cffd9e9609f4b7737f1d7b27e9240d8d788483e223b5b20d8b9837c1737708f702b4830b3dc06055aa25d24026b0cdf7197459af9fdd2baaa3

  • SSDEEP

    6144:K4eZA+tMPSkR8Zbd+z6oxVr/d6bVdNKfiH/Og++H6oMdMYTyalG4:K4eZA+tMPSxZbd46GlmTOg++HKKYl

Malware Config

Signatures

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 8 IoCs
  • Isrstealer family
  • Detected Nirsoft tools 2 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 2 IoCs

    Password recovery tool for various email clients

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_235138719883429e805b3fd05310326a.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_235138719883429e805b3fd05310326a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_235138719883429e805b3fd05310326a.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_235138719883429e805b3fd05310326a.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1960
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_235138719883429e805b3fd05310326a.exe
        "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_235138719883429e805b3fd05310326a.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2456
        • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_235138719883429e805b3fd05310326a.exe
          /scomma "C:\Users\Admin\AppData\Local\Temp\AUCWqzMLo5.ini"
          4⤵
            PID:2392
          • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_235138719883429e805b3fd05310326a.exe
            /scomma "C:\Users\Admin\AppData\Local\Temp\egL30Q0drE.ini"
            4⤵
            • Accesses Microsoft Outlook accounts
            • System Location Discovery: System Language Discovery
            PID:2636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1960-4-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB

    • memory/1960-3-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB

    • memory/1960-0-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB

    • memory/1960-2-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB

    • memory/1960-5-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB

    • memory/1960-10-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB

    • memory/1960-11-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB

    • memory/1960-8-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB

    • memory/1960-6-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1960-1-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB

    • memory/1960-22-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB

    • memory/2456-21-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2456-12-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2456-14-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2456-16-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2456-31-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2456-32-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2636-28-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2636-30-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2636-29-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2636-26-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2636-33-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.