Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 10:55

General

  • Target

    ed41a69b8fbfbdee0148eba63b9c6e01_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    ed41a69b8fbfbdee0148eba63b9c6e01

  • SHA1

    f67434b508c5eed439f835407e228e8502585786

  • SHA256

    cc3e5058ac37e5db39fa7e4ea00e44ec20f06400a3ea2e4930da4cadf77b2546

  • SHA512

    15ec8b4857834c9bff2eb44eec9e7791c8811f5568862ed0f263b54681e65c9f40c33bc33d62d3e98337e5466e29ebdea04a3a5b6c62f81c0410608c109edbca

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6k:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5t

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed41a69b8fbfbdee0148eba63b9c6e01_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed41a69b8fbfbdee0148eba63b9c6e01_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\SysWOW64\nezzvuwodc.exe
      nezzvuwodc.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Windows\SysWOW64\czjejpga.exe
        C:\Windows\system32\czjejpga.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4264
    • C:\Windows\SysWOW64\blvzdalwsmzkngi.exe
      blvzdalwsmzkngi.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3820
    • C:\Windows\SysWOW64\czjejpga.exe
      czjejpga.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4908
    • C:\Windows\SysWOW64\zxweicrlpcnqp.exe
      zxweicrlpcnqp.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:376
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    949cfb9ea22ad56e54719c5a30ca10ac

    SHA1

    1549cc1d845b05aae4c0625a5012b27814473152

    SHA256

    1b6131ae50bedfc9ced1c5902f925d4756e40e6e3ddcb2aea70226b289aa6c1f

    SHA512

    941c77b40f6b4f34451cb8e0b0164d655e0eb81fed82ec3be2ffdc3306dbac5e611daf4165284262be97fbf9d3a9b8444d709c77aa8ee3b3aaa957b07ee060a1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    f96351fa346a0e5eb127cca0be9073cd

    SHA1

    1513beda7345e9d26342c8c20d40fd5f9b6f8517

    SHA256

    b8fa86c677ef20ff58f3de209a6c4aa421e7693986e208fdcc0fc4af8608136c

    SHA512

    9c0a6f1dac9953f8a4cf961a6df2091043dd1654e417630631af5a727887b1901d7364efa908e70778def4bf80c737cb2b1bab8d53d0d86fe9cbfae1f9f9d24f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    c73d67f80f3323f339f6fb5c11445836

    SHA1

    51390e4b09e6782a6415b0b533e453e4fd0d17ae

    SHA256

    8f338cbe8574793a2a1469a621989fe3bf3d737996cba89c3a211c20ed8acd02

    SHA512

    3a0388067957a00bfb8ccefd41574b9d6c5075a4c1ca1239a670b748d5ae5090beae4b78a122df75b2e5cc03d3d1a7407f4fa14ad579cb49a26501161615bd4d

  • C:\Windows\SysWOW64\blvzdalwsmzkngi.exe

    Filesize

    512KB

    MD5

    dbdc3dff52404bc461bb2775fe7eea1f

    SHA1

    e15c99bfc7fd706d20e60decaa752642efa280cb

    SHA256

    d02491482b1440ed9c1f4691349af01dcf9cd8e564a4082192c8f2d1147a3498

    SHA512

    d4562f4a02f9ade89223c48e57e4fb2e47fd03a524724bc73a56d9d2db44b5dcb0187af7a20f2e6f0c4a0f7fa2a07fc123547c2f05f6b92dd14fc89b84b6d036

  • C:\Windows\SysWOW64\czjejpga.exe

    Filesize

    512KB

    MD5

    8b99319e6aaf0cdc7c1946ed18cac50d

    SHA1

    c41fdb1f37e5067e5f402db70c2da21965391339

    SHA256

    9188c9c891f66fb279eae10221c041d3394b120c44208727c3574b97dbbf2a83

    SHA512

    215a649783221489a356867296748942c3beff6b6b09f86f6995efbeb42d1804719d9cc12295f3fd06dc0f7fff04bf369e0e235fd1ac9b4bae70fb1407d2973a

  • C:\Windows\SysWOW64\nezzvuwodc.exe

    Filesize

    512KB

    MD5

    1c1a7bba951dbd99672cf42988c2285f

    SHA1

    73b2f73a5e2dc0dea253d52b39a3a59a63b6f6bc

    SHA256

    930397996232b9ac3f33600646505df054cf75830ed7750e447d4e8ed9e40c2f

    SHA512

    d02d8ab5038e3947bedd3377b204f958e98683274c21f2672e1642ca235a9ed32a831ce99f8414f50f6f709710be3507aa4d6bcb3d01e526bac00797f097c64b

  • C:\Windows\SysWOW64\zxweicrlpcnqp.exe

    Filesize

    512KB

    MD5

    d71635e164b88473733a010c8bfb688f

    SHA1

    0c9c4d6ba6d2cd4f4e26efbf56d3f2685b44014b

    SHA256

    d50fa07304234354d974a5a5c73302652006ea16c6775f092ed82ff0ee7af299

    SHA512

    f7f7b9313754c1282b94e5c7eebaa592d7ddbc1b7df198459458efc3ed9c21ceb2a1768e1c9626ed583b1946cce71328a8b5ae7486a6118b1b149d4fcbb684c4

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    be73ac2682b72e0c71d24216ea664f14

    SHA1

    f74bc87363fb0295e9ed4ee579d340fc3c950857

    SHA256

    7cf14788e988eeb09968e91180242ebf8136b7ce7872714cf44e4362209151e3

    SHA512

    f57112cef766985f3f6be10a53716851ec32ed0894465a6245125decaf3f958f3fc9a182d87f0556cc02610e13686b713830d4d5bc88b3f656fe062c6c859dca

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    de1a04975f0f840fbc8fa704b8bf36b5

    SHA1

    5bbe011b326614e7a783cfbbb2735f7f80c5e58e

    SHA256

    e86374cc84305cc52374c4966b574004c914a48c923bdd87875e3f7a32c5ff92

    SHA512

    87283bc59c60c463e7464256a597e9921440861551ef03b86e9c42001db839953600bd9c96dd50cfd51b637aaa74bb3a3575842c57b7441adc7e4295131a60a1

  • memory/228-44-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

    Filesize

    64KB

  • memory/228-62-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-43-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-46-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-48-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-47-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-49-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-51-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-52-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-50-0x00007FFA07D40000-0x00007FFA07D50000-memory.dmp

    Filesize

    64KB

  • memory/228-53-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-54-0x00007FFA07D40000-0x00007FFA07D50000-memory.dmp

    Filesize

    64KB

  • memory/228-55-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-57-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-56-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-58-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-61-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-45-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-141-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-42-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

    Filesize

    64KB

  • memory/228-38-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-39-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

    Filesize

    64KB

  • memory/228-41-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-40-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

    Filesize

    64KB

  • memory/228-37-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

    Filesize

    64KB

  • memory/228-113-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-114-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-115-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/228-137-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

    Filesize

    64KB

  • memory/228-138-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

    Filesize

    64KB

  • memory/228-139-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

    Filesize

    64KB

  • memory/228-140-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

    Filesize

    64KB

  • memory/2096-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB