Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2024, 20:01

General

  • Target

    fb10214753750608e5c2129fb638b674_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    fb10214753750608e5c2129fb638b674

  • SHA1

    c447a574de25699d6eaceedbcae3e5501c5b3705

  • SHA256

    0e2e676b9203b13b2c70b42f9018c3dff31781cdd876eb7db007366c4c2b9049

  • SHA512

    99fc9168a5149361435c03d646a714ea45af60b9c18eab70c584ebbfebc69c8a9dcecddfa924c6f0b8183527c08eba2a73b3324ce8de36af888c96fff9c05549

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6B:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5I

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 11 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb10214753750608e5c2129fb638b674_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fb10214753750608e5c2129fb638b674_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Windows\SysWOW64\yebstxpygc.exe
      yebstxpygc.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4944
      • C:\Windows\SysWOW64\lqllgpci.exe
        C:\Windows\system32\lqllgpci.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3148
    • C:\Windows\SysWOW64\vdhlrczczdytsbd.exe
      vdhlrczczdytsbd.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4972
    • C:\Windows\SysWOW64\lqllgpci.exe
      lqllgpci.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5008
    • C:\Windows\SysWOW64\kxkhsfwhiyvzm.exe
      kxkhsfwhiyvzm.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4676
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    8149d6e7341e57181baa1539db4da3d0

    SHA1

    cbc62e26a72a77df108ed84996fc0808eb0c5f42

    SHA256

    612d3ab670a830355a5addd09b7b5a52a9cf64ed762cce300d9ef364964c3d3d

    SHA512

    93dc1863b239752b3822ccba74fd6922b0e064f3d433d7a5c03e29d97e65b93b36a6f3981da84ca22fc0a2df6529f7b1403fb4b7f13120bbe15862238046286e

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    5c32bfa93ea15c0fd5a74b4d23292d1f

    SHA1

    6a7efe2f7732b9ace67b1e191a82621fa0ea8b8c

    SHA256

    5fd4448531ee64d14da3572911aed3efbc04f029a73cbb58c780fc9b43d2ea63

    SHA512

    e216f7fff35d5c0dca2f12d5273629556761e4a416850d806ed018e660c583dc72a9dd905017f57ad2310759671e687cb3004e4d4e2db55d8ab55a08afabf4d1

  • C:\Users\Admin\AppData\Local\Temp\TCD838A.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    a904d0d5bb2f9203037b6f31a3ee2859

    SHA1

    26a954e4c6503ccb30ef6f9097b138ca07226128

    SHA256

    bd133c2e311be342522e82a20cc237a8e0b7ec100d88de44f87708a669962986

    SHA512

    46af63cdb1cdc54a8e95d258b9e45d4606a22a00e23e92628e85ce6edcc5d1c3f7f59a1ee1e78bbde62a071e83cd4ae8a92795424dc87d1ea0d7fc123d7e75ed

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    fa63bd7c833344e84ca2174273d35a41

    SHA1

    203a4836f0934749f1fb2e649456f5fdf8f9affd

    SHA256

    7476367ef0e9a4035fd909471a1ee8b90461ffbcbe2bccc69b656c72ab8d1920

    SHA512

    ca87feed02c3ac70fec7eab0fccb787071041de03df5d574db0a95e7076425afa0d2ae75466204527be6395965492f4722a23592480f5ecd84a93febeb905675

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    91adc5ea7b14986a09db64bd90f4d7c2

    SHA1

    84e655ef16f5b1efe180023f3fcd4b2051762878

    SHA256

    605378641991d098c12929b08b0e1db2a8d6153e543ae481870ae99a11fdc83f

    SHA512

    307c1c3c9ff1b48b301c00af72ba35e8b31c89c2b8b903e4ac3d831e4fa6e675d8f1016d4d0a583881fdebe05300ebcf955958a81530dee59d35283f405a5d31

  • C:\Users\Admin\Documents\SplitRename.doc.exe

    Filesize

    512KB

    MD5

    1e38e98602eb90acf499f1b848fb1559

    SHA1

    59344651615a7beba281519732bd4398d747e9cb

    SHA256

    d5ae97bc86388d93f50c2a3181f17ead00c6ed79a278c1f77ff9e97756f0ce67

    SHA512

    4801f34ee356c9806891be5bbccd2a9e6d261baf2246bb3cc8f5411c7e6b1431bac283feccaa322f87effbd0c6a8fc86802e02b7071010cb17902bb69d7c7345

  • C:\Users\Admin\Documents\UnregisterDeny.doc.exe

    Filesize

    512KB

    MD5

    a57dd889a124f24162c1558a6f090104

    SHA1

    cbef217ad48cbb4fc737d10836820ba73d65db7a

    SHA256

    a8f33c8d27e85dc1c9298bd25a0b5fa857163ce6c1cf048cbef9a4f5116d2d4b

    SHA512

    2019ee38f154e17d0a2bec6b045eb567a4a51b72ba89ca5b7a6c9e853f966e0fcbce981d1d440df24cf86bbb7c1a48fe4325468339919ed8582b4e859b9339f4

  • C:\Windows\SysWOW64\kxkhsfwhiyvzm.exe

    Filesize

    512KB

    MD5

    a23a8f2a6e7d79938f9be36a7cd22883

    SHA1

    589974b4a3d4213f408bf76d9ac2eb733d9f1986

    SHA256

    566f450dea1c8a5fab513c5a06b852549cb582a90d7c3ff0c7874548f5cce2ab

    SHA512

    2c488435505014460708caa06720cbf94f73125aa73bcf61740da241c7f482c2cb0fadb0be173589619fcc4ced8f13d3426e05a0d658ecac5cbfea83e153460b

  • C:\Windows\SysWOW64\lqllgpci.exe

    Filesize

    512KB

    MD5

    ecfc6797c75acb54f7127ba0ea88cd2b

    SHA1

    502eac7703222c0d258059daa31bb42697049e65

    SHA256

    686e9cb3712ef1031956817d5e39d5146f18b8d6675ef7898a5a777f6e8b8901

    SHA512

    ab08e00ef650889ca582ca565b3cae6dee19f531fd549c4bfc2fcc59acd2ca0bfde1ba29bc93511acc2144e0e8a485ab748f80ce81d0724c3aff313b880e1d2c

  • C:\Windows\SysWOW64\vdhlrczczdytsbd.exe

    Filesize

    512KB

    MD5

    320d9870dc3a939f84261e9b192bc877

    SHA1

    465c2657fa5dd68d5881f434c0467b8c5ec0f89c

    SHA256

    5c9617fe641659ac61dd83318772b8b1e60daec5ad4da1388d99e0759c0569d0

    SHA512

    912537d1d33cd432def159e1d392a1125a0f233a2e1570f9a233f4133cd0f1cb9505454f048c60817829c1a7b89fc31e24697efd1629c55ec06d58a98aff5ca3

  • C:\Windows\SysWOW64\yebstxpygc.exe

    Filesize

    512KB

    MD5

    9de5dee8c29f9bb10c932d5a6b554792

    SHA1

    341ce6ddfe67205fad07b90c909b40f309326c18

    SHA256

    9dcb2400b019a43d77e8a71072d0cb8d724e4bac9187ced5790107d0b4386a9e

    SHA512

    88db4846c71649920dfab9b70f1c23b56fd761744068a9b8c998fa19e12b0ec6c1817a6ec550681643d4aa669aa56459fc8ad2189dad470ab6f3bbabcdd53263

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    ee2a4a886a3441f93317a36ed7891228

    SHA1

    83805828e4d1990b1cdfcde6890564117fb19558

    SHA256

    9021c3a50e9a76fe915570c868f9e164e0707d508e1a670733d4afa47fd62dbd

    SHA512

    5fe4324cf46c78d822a9e89748d7d2140ba1d1bc7bdff6430016a0bb2704b819f2f73bd7c1ea2ca1c830c3e54d39d52a594e4f586c5c1e81b31a0857423a64f9

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    b4ebc397c6a220a7a6a2ac85180b6602

    SHA1

    35a8e9cb217358e16a368e5f93f49e8340690ab6

    SHA256

    afa12198c2a7d680ae278766ed26fe2aaa2850215774b8d99689d57cc4c27127

    SHA512

    4947630cdd86e28e983e55acd563cd3edaadb25cea64731fd0229f81bd42360ed4262480a8276bc5dcf8c7842ec9efe545bd0d3a38294f178fb153b69d969960

  • memory/1480-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/4900-43-0x00007FF8A31B0000-0x00007FF8A31C0000-memory.dmp

    Filesize

    64KB

  • memory/4900-38-0x00007FF8A31B0000-0x00007FF8A31C0000-memory.dmp

    Filesize

    64KB

  • memory/4900-47-0x00007FF8A1150000-0x00007FF8A1160000-memory.dmp

    Filesize

    64KB

  • memory/4900-46-0x00007FF8E3130000-0x00007FF8E3325000-memory.dmp

    Filesize

    2.0MB

  • memory/4900-45-0x00007FF8E3130000-0x00007FF8E3325000-memory.dmp

    Filesize

    2.0MB

  • memory/4900-620-0x00007FF8A31B0000-0x00007FF8A31C0000-memory.dmp

    Filesize

    64KB

  • memory/4900-44-0x00007FF8E3130000-0x00007FF8E3325000-memory.dmp

    Filesize

    2.0MB

  • memory/4900-41-0x00007FF8A31B0000-0x00007FF8A31C0000-memory.dmp

    Filesize

    64KB

  • memory/4900-42-0x00007FF8E3130000-0x00007FF8E3325000-memory.dmp

    Filesize

    2.0MB

  • memory/4900-40-0x00007FF8E3130000-0x00007FF8E3325000-memory.dmp

    Filesize

    2.0MB

  • memory/4900-39-0x00007FF8A31B0000-0x00007FF8A31C0000-memory.dmp

    Filesize

    64KB

  • memory/4900-48-0x00007FF8A1150000-0x00007FF8A1160000-memory.dmp

    Filesize

    64KB

  • memory/4900-542-0x00007FF8E3130000-0x00007FF8E3325000-memory.dmp

    Filesize

    2.0MB

  • memory/4900-541-0x00007FF8E3130000-0x00007FF8E3325000-memory.dmp

    Filesize

    2.0MB

  • memory/4900-561-0x00007FF8E3130000-0x00007FF8E3325000-memory.dmp

    Filesize

    2.0MB

  • memory/4900-37-0x00007FF8A31B0000-0x00007FF8A31C0000-memory.dmp

    Filesize

    64KB

  • memory/4900-621-0x00007FF8A31B0000-0x00007FF8A31C0000-memory.dmp

    Filesize

    64KB

  • memory/4900-625-0x00007FF8E3130000-0x00007FF8E3325000-memory.dmp

    Filesize

    2.0MB

  • memory/4900-624-0x00007FF8A31B0000-0x00007FF8A31C0000-memory.dmp

    Filesize

    64KB

  • memory/4900-623-0x00007FF8E3130000-0x00007FF8E3325000-memory.dmp

    Filesize

    2.0MB

  • memory/4900-622-0x00007FF8A31B0000-0x00007FF8A31C0000-memory.dmp

    Filesize

    64KB

  • memory/4900-626-0x00007FF8E3130000-0x00007FF8E3325000-memory.dmp

    Filesize

    2.0MB

  • memory/4900-627-0x00007FF8E3130000-0x00007FF8E3325000-memory.dmp

    Filesize

    2.0MB