Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2025, 08:48

General

  • Target

    JaffaCakes118_6453b926503f0a47ace96ee12c18bc33.exe

  • Size

    801KB

  • MD5

    6453b926503f0a47ace96ee12c18bc33

  • SHA1

    37cee84fa9803f42ccd049063959570adaa425ba

  • SHA256

    a4e4ac00d4ba53d06796e517e5153981ceb64f6c6cec9ea2498866d31967298f

  • SHA512

    b0c31b05d59dccf9ec4ad7154f1b6e1c381e3d80ea1ce80c1d795ac7d08b2857fda30a1e984d8a79859b70437729ecf14d8a5c76c76babca3c5f2ebc199d21d6

  • SSDEEP

    12288:QwGTnyOtnxv6S4mtDuPa97JnEFEmR3PyiYg6cDL1WtThAVARl6t2YeHFvk3+f:DsyS6xcsEli8iz9uhDknOR

Malware Config

Extracted

Family

latentbot

C2

softwaredev.zapto.org

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 13 IoCs
  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Latentbot family
  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6453b926503f0a47ace96ee12c18bc33.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6453b926503f0a47ace96ee12c18bc33.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Local\Temp\Firefox Speed Booster V 4.exe
      "C:\Users\Admin\AppData\Local\Temp\Firefox Speed Booster V 4.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4012
      • C:\Users\Admin\AppData\Roaming\Firefox Speed Booster V 4.exe
        "C:\Users\Admin\AppData\Roaming\Firefox Speed Booster V 4.exe"
        3⤵
        • Adds policy Run key to start application
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1544
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3512
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:232
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Firefox Speed Booster V 4.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Firefox Speed Booster V 4.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4752
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Firefox Speed Booster V 4.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Firefox Speed Booster V 4.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:220
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1944
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:760
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchoster.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchoster.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4412
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchoster.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchoster.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:2756
    • C:\Users\Admin\AppData\Local\Temp\SVCH0ST.exe
      "C:\Users\Admin\AppData\Local\Temp\SVCH0ST.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3988
      • C:\Users\Admin\AppData\Local\Temp\SVCH0ST.exe
        C:\Users\Admin\AppData\Local\Temp\SVCH0ST.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Firefox Speed Booster V 4.exe

    Filesize

    532KB

    MD5

    a1fbc2ee381a4981c973ad8efd275e92

    SHA1

    ddc036889893267d8917facc48b1e3eea380f6f0

    SHA256

    2b361e099e0af9eed2f67973873a189c290b1f32984dc2f560d277b8e1c87a72

    SHA512

    b4482c7984c5676618db162accfcd507752c1463fdb40259056e14a17bb8b05cc99763b37004f6dd12d1c5e3deb00c323e6f76703d6fe47655636979e809c277

  • C:\Users\Admin\AppData\Local\Temp\SVCH0ST.exe

    Filesize

    444KB

    MD5

    cc3f40aaa43594aa6bdeb476e1e734c6

    SHA1

    e2268857d09aa6179f6bc50579c616f34d912545

    SHA256

    622997cc3aa13d63bb0a01a50082f36753d86e96b0af2b3ad78de9d46f33ffdd

    SHA512

    0fc5a0c3288086ffecc8149eb3bfcd585fc3cb43814df9379e738cf1d0d1ff660dfc8b1db32c7a8c62e38f5b59d4d9ed7c22e9473b19919c5c26b6c696264b77

  • C:\Users\Admin\AppData\Local\Temp\license.dll

    Filesize

    13KB

    MD5

    b5afa963a369efefb8f905594bafa2df

    SHA1

    18a2375501100007a067944f6c2f494fd085528e

    SHA256

    58fb10a17191f36961266e5a0153e81219f6c99b464b3998e8e75d636151ae95

    SHA512

    7ac1c5c9c9a66dff9a43aa055288a7ec8deec1c7e2b74a18a7e2509409df4094b0bf6d789bca59fd2ef3045cb768d1d9979779dcf68a91332ec1cf9c6bf118de

  • C:\Users\Admin\AppData\Roaming\Firefox Speed Booster V 4.exe

    Filesize

    16KB

    MD5

    02172c9f873de4309101c7b0aa635bb7

    SHA1

    fc33532d22494d1c5e841961e21dd3fcac6154cf

    SHA256

    cfba657e65e098fc8c5c23a260b3d1f9d0769c255b03531b7aa34a2845153a13

    SHA512

    bfa7fb080abb825d2cdbff2d7a7ba30f21ff20c81f30e902f826b00a63f2fe1b02f6eb77c6db8487dd31140540fcdae46ce32d6314586d68c58df787f5d6e754

  • memory/1544-65-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1544-69-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1544-78-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1544-76-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1544-74-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1544-73-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1544-49-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1544-71-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1544-53-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1544-70-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1544-66-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1544-63-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1544-62-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/4012-61-0x0000000073A70000-0x0000000074021000-memory.dmp

    Filesize

    5.7MB

  • memory/4012-19-0x0000000073A72000-0x0000000073A73000-memory.dmp

    Filesize

    4KB

  • memory/4012-60-0x0000000073A70000-0x0000000074021000-memory.dmp

    Filesize

    5.7MB

  • memory/4012-59-0x0000000073A72000-0x0000000073A73000-memory.dmp

    Filesize

    4KB

  • memory/4012-23-0x0000000073A70000-0x0000000074021000-memory.dmp

    Filesize

    5.7MB

  • memory/4012-24-0x0000000073A70000-0x0000000074021000-memory.dmp

    Filesize

    5.7MB

  • memory/4016-27-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/4016-34-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/4016-31-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/4016-30-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB