Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2024, 14:24

General

  • Target

    ff7b822e54c2edaef55bbc71f55dbbc6_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    ff7b822e54c2edaef55bbc71f55dbbc6

  • SHA1

    70b57dd4282a005ddb46ed11271e20c2ae93852b

  • SHA256

    0ccaa44e009a7ad5502647fc7369f722174af5726aa363ebe8fdaa31becec40d

  • SHA512

    a73833174a69e7692e764b2e5be0d72550b8172cdaf1171038d548bc0e7e30ec4fcd13509b8ecd3577ab100da4e21e286a438c3b510349a5e2805278cf00801a

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6s:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5j

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff7b822e54c2edaef55bbc71f55dbbc6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ff7b822e54c2edaef55bbc71f55dbbc6_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Windows\SysWOW64\axwsfkhrtq.exe
      axwsfkhrtq.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Windows\SysWOW64\tkuasred.exe
        C:\Windows\system32\tkuasred.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3248
    • C:\Windows\SysWOW64\osfgbkbbhjxxniv.exe
      osfgbkbbhjxxniv.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2472
    • C:\Windows\SysWOW64\tkuasred.exe
      tkuasred.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1900
    • C:\Windows\SysWOW64\jdtrnodlhcrdx.exe
      jdtrnodlhcrdx.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3968
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCD8A46.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    de703aa2d57303b583a49c105265589d

    SHA1

    e83d6fe01accd2f3fe4b990de5711ebbf6680680

    SHA256

    b6a5e7c8b87c643b0f4407939e2ac60423e59178d174e00f814f95c3dfa69cd5

    SHA512

    7a15c1fa3555d9afe102b15d7f6525b76501f963e4ee69fd7a4d7125a7228b30326cf65a169f569f337db7cf4902a644d9e8793e7e2fa72395a9512b752a6258

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    4d84543e01a48f9ef212a797315b7fdf

    SHA1

    7a9f5cb6104fdef68e4fe5ab2dea603f4a4f18ee

    SHA256

    140b64a48a80edab6ca628002da74dfba1f4eb70781a1e63d58ffbaa021bbca8

    SHA512

    4cf7094704310099a4e1a1c40c1056d9cbe5312f5ced7b341d38562fff4b2fbf7ec4f9e9e3bc1f9ae3e0302f8082082be94df6b03fc67b4426ad2b9a87663fdb

  • C:\Users\Admin\Music\SplitSubmit.doc.exe

    Filesize

    512KB

    MD5

    7b54722918963598f8d43942f130b123

    SHA1

    6626ebdb659d527aa86d9853f2f5a5e31cd159ef

    SHA256

    b29b1802af36ffcdab9fd44de496c5c502ff1b26be23886498aff1435c0ec759

    SHA512

    67bdd0faaa06548ab28813747cdfc4881e34657e913637a6ae2a6ed9ccfcb95d1ffd23bd748f1b4e17e8eb5ce6ad477622d418b00d51e949c671e80f89e5eda2

  • C:\Windows\SysWOW64\axwsfkhrtq.exe

    Filesize

    512KB

    MD5

    e42e5d47ba73aab162ade3f1340d9f66

    SHA1

    cb3944894ae8818454a83d9c0279cd8f66fff33e

    SHA256

    a2b4bbe00615eca2b57b1b71cc4b1578b89f9307b9b736511419995f4821e158

    SHA512

    af858c459e01bf64ae42fbc56bdf991de3d1d3aa06841dc20fd046ac072847057301725033fc6ac9932b68657e1a12e714ae8c9791d593838e2128fd4b126531

  • C:\Windows\SysWOW64\jdtrnodlhcrdx.exe

    Filesize

    512KB

    MD5

    8d4b06df3ae34b7f359dad24c7a15671

    SHA1

    1df8a651ef559658935fdfdc63e470ab07db54b1

    SHA256

    94665272e77bc97a29cf36002d4b6b9c64b27d36d003fb57c4f5b32d1876530f

    SHA512

    8d35cfa00ea0e860979db86c37c95c5b4288c80ce30d78a6089907d362fc711b990d5d2b8ea3710855d8b64cb296248df6b12a926fc29886649e8df10406c6ab

  • C:\Windows\SysWOW64\osfgbkbbhjxxniv.exe

    Filesize

    512KB

    MD5

    2f414a609a3bb0b91229627843a614cf

    SHA1

    1bd3f50560d64bfc5d1326a0dc04637a4c999d8f

    SHA256

    e7706aa3780e5f49e92a52fb46ceb3a06eec1b40f8f81ef6d4335ce274ac379e

    SHA512

    1d1f21003528818d89ece66bd9ed4b54b220462a2c6d92a619d979c351ceb7e9b9c8445febf6a6e6557ebb8c9b790bf011e37557a89495a7915648a5cce68172

  • C:\Windows\SysWOW64\tkuasred.exe

    Filesize

    512KB

    MD5

    6072f02484b7826cf1d6319e935b1ff7

    SHA1

    610ff4d2d2795fb598c916c8e4d49bb31b975c21

    SHA256

    9a324bfac80a66690bc89f339e826f6df731a2238a4173c62da63241cc6d6c8e

    SHA512

    12d71462cef198322602486670a775e2912944f7477af0708d1284fb971dd208a1436ecb89eeaf56f2f9de24dfc8493123ff3aa308adc6ebf1c2efcadccebb66

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    af299c8746c3e9d63ee26d7d2ae64ccc

    SHA1

    6c176ae07132fecf361af34f6dcb3aba37ac2b24

    SHA256

    f20b544900d18606ffc30eca6397a9f0d7ebffde2513e132a0c1d79dbd2abc67

    SHA512

    b8af42c173aacefc27327feb332be7ffd014bb081fa0328e620621d9bdc7d7e23f0271a91c4d222dcf3c476842b3dec4583d4ef9833519f962eab31f39d94de0

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    86f671cc6be3f935cdc418b54cb0af5d

    SHA1

    0fda3b84949e2629f9fad68edcdcd6ded706fd55

    SHA256

    fe4f14c21b8be73d93b02b628bbd09f953a85fde8d7b9363ec5dea055f8840d9

    SHA512

    34db52686dce3642cb18c3e6bc8431c73bdb92aaf0d3809b7749d15954d17ee8175d56fdb0d66e76aa16770eae5c4a69d5f60eac55ddca1c4ebddde9aeb5a151

  • memory/1756-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/3484-40-0x00007FFA4C790000-0x00007FFA4C7A0000-memory.dmp

    Filesize

    64KB

  • memory/3484-105-0x00007FFA8C710000-0x00007FFA8C905000-memory.dmp

    Filesize

    2.0MB

  • memory/3484-45-0x00007FFA4C790000-0x00007FFA4C7A0000-memory.dmp

    Filesize

    64KB

  • memory/3484-46-0x00007FFA8C710000-0x00007FFA8C905000-memory.dmp

    Filesize

    2.0MB

  • memory/3484-47-0x00007FFA8C710000-0x00007FFA8C905000-memory.dmp

    Filesize

    2.0MB

  • memory/3484-48-0x00007FFA8C710000-0x00007FFA8C905000-memory.dmp

    Filesize

    2.0MB

  • memory/3484-50-0x00007FFA8C710000-0x00007FFA8C905000-memory.dmp

    Filesize

    2.0MB

  • memory/3484-53-0x00007FFA8C710000-0x00007FFA8C905000-memory.dmp

    Filesize

    2.0MB

  • memory/3484-49-0x00007FFA4A630000-0x00007FFA4A640000-memory.dmp

    Filesize

    64KB

  • memory/3484-54-0x00007FFA4A630000-0x00007FFA4A640000-memory.dmp

    Filesize

    64KB

  • memory/3484-44-0x00007FFA8C710000-0x00007FFA8C905000-memory.dmp

    Filesize

    2.0MB

  • memory/3484-41-0x00007FFA8C710000-0x00007FFA8C905000-memory.dmp

    Filesize

    2.0MB

  • memory/3484-42-0x00007FFA8C710000-0x00007FFA8C905000-memory.dmp

    Filesize

    2.0MB

  • memory/3484-38-0x00007FFA4C790000-0x00007FFA4C7A0000-memory.dmp

    Filesize

    64KB

  • memory/3484-39-0x00007FFA8C710000-0x00007FFA8C905000-memory.dmp

    Filesize

    2.0MB

  • memory/3484-43-0x00007FFA4C790000-0x00007FFA4C7A0000-memory.dmp

    Filesize

    64KB

  • memory/3484-37-0x00007FFA8C710000-0x00007FFA8C905000-memory.dmp

    Filesize

    2.0MB

  • memory/3484-36-0x00007FFA8C710000-0x00007FFA8C905000-memory.dmp

    Filesize

    2.0MB

  • memory/3484-35-0x00007FFA4C790000-0x00007FFA4C7A0000-memory.dmp

    Filesize

    64KB

  • memory/3484-421-0x00007FFA8C710000-0x00007FFA8C905000-memory.dmp

    Filesize

    2.0MB

  • memory/3484-431-0x00007FFA8C710000-0x00007FFA8C905000-memory.dmp

    Filesize

    2.0MB

  • memory/3484-558-0x00007FFA8C710000-0x00007FFA8C905000-memory.dmp

    Filesize

    2.0MB

  • memory/3484-617-0x00007FFA4C790000-0x00007FFA4C7A0000-memory.dmp

    Filesize

    64KB

  • memory/3484-618-0x00007FFA4C790000-0x00007FFA4C7A0000-memory.dmp

    Filesize

    64KB

  • memory/3484-619-0x00007FFA4C790000-0x00007FFA4C7A0000-memory.dmp

    Filesize

    64KB

  • memory/3484-622-0x00007FFA8C710000-0x00007FFA8C905000-memory.dmp

    Filesize

    2.0MB

  • memory/3484-621-0x00007FFA8C710000-0x00007FFA8C905000-memory.dmp

    Filesize

    2.0MB

  • memory/3484-620-0x00007FFA4C790000-0x00007FFA4C7A0000-memory.dmp

    Filesize

    64KB

  • memory/3484-623-0x00007FFA8C710000-0x00007FFA8C905000-memory.dmp

    Filesize

    2.0MB