Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2024, 15:33

General

  • Target

    0c2ad584d31fe206c899182dda81e46c_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    0c2ad584d31fe206c899182dda81e46c

  • SHA1

    af69f9ca058a751f340f1927c7fe3095bfc90363

  • SHA256

    33a0bb3fa801f4c63f4c4cc849e2efd6561518dfcc50ee5feaa8cd3ef3418a8e

  • SHA512

    005735b3cd1861c0c773f7c13c222e2b4f86fd81b3cafd20530bbf0075a4b80646ced3edc4cd0220f4cf66d2cc7e88df458d974655abd688f26f5a55d7dba299

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6P:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm58

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c2ad584d31fe206c899182dda81e46c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0c2ad584d31fe206c899182dda81e46c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Windows\SysWOW64\gvcyrbtxym.exe
      gvcyrbtxym.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Windows\SysWOW64\blacygic.exe
        C:\Windows\system32\blacygic.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2448
    • C:\Windows\SysWOW64\nixhxhyowgtqpod.exe
      nixhxhyowgtqpod.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2576
    • C:\Windows\SysWOW64\blacygic.exe
      blacygic.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2652
    • C:\Windows\SysWOW64\yowrsgfitqoxa.exe
      yowrsgfitqoxa.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2064
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1512

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      99349cbcd96204a16e1f26edfefa8df9

      SHA1

      37cc9c406d12828fb8699670c197a26ee5a76e04

      SHA256

      68051fcb21c9b9d00439b54a0e23d2ce885a26a08baba10657ae871a8c392466

      SHA512

      5cd817aec06acba16ee268d8e3e1c2ad9b142b9dedfa74de6b7b8770159dd8de9565ab4530563723aa996728876cf6b02365e09fe5383b2b0c26fae6c47a43f3

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      0f607532821c7e3e26181894c5ac8869

      SHA1

      4f115a64035d7626aceea059d41090b57508aabc

      SHA256

      d881cbc7a5767fa18f638967107dba61962fa359fda676d21eabbf738ff3674d

      SHA512

      10ebcd3cba37ca389362de22e8acf992a36237ef35414a743846d1dae8ceb58fdc9e5951e9ab68ff97e9a50a1729379618df464be47c656c872be8d81c3fd3c8

    • C:\Windows\SysWOW64\nixhxhyowgtqpod.exe

      Filesize

      512KB

      MD5

      01460b865a78810c634a548177651530

      SHA1

      77882e33ddb22fee6a58cb1442ce36bfe3e18950

      SHA256

      8e78d7d1e7128969061fc71f51f25ff26f062f07aee4bbabd7aaeac5f77ea945

      SHA512

      8d6c418c251bd7968644926cbcfb69157111707236cdd0558874d94858c6ebd1438da025e9c7d4ba6b30dc5e91ab79d218600117c307d77871250078c55c7096

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\blacygic.exe

      Filesize

      512KB

      MD5

      16cf5cba1f0e4ef0c6f5de0f9c86a0d6

      SHA1

      3e6ef07033d1aff7412ca93bb402fd3b36e59168

      SHA256

      0ae5ee0c419dffeaeecc4ee0a5fd6f69a5b93c52744745e60f3f011b6d3b13c3

      SHA512

      7a3f441ff8b15f0669966bcaafdcabdc63acad43484caa1393f52bfabe61c4aee3622d22f7121e2eb6a104cdff14f651f813976932032ce71782076f4e520efb

    • \Windows\SysWOW64\gvcyrbtxym.exe

      Filesize

      512KB

      MD5

      ec984893e64b54410dd5911e4c34224c

      SHA1

      ca3911f88fa4f834afb505a3d109a75a61c18e2b

      SHA256

      1fcf807a7c09dd6579b71d3a7b558f61260c63ca4688b60f4a308df5b9da36f7

      SHA512

      fac33b974d5da213a2bb083f53bcedaef69e4e7ffd72cf1fba87e5310c0bcfa512f32d58f92fe0c6df527bc65db7c9a7c2c1eab6960a60a1cc560e30c80922bb

    • \Windows\SysWOW64\yowrsgfitqoxa.exe

      Filesize

      512KB

      MD5

      855dfb608edc8c63ed9d7cb10961f6fd

      SHA1

      c0f7142e6ca3caac25b0569259b19ee67b44804c

      SHA256

      0041041fc3f97772c3c87908996376d0ba2a9ed824d3bd4b0876b190fec02c45

      SHA512

      37d2320f61f1eb8e47e2b89b251a184d98ac7fd61d2b2f7d7d2d7f4d7f406313cfdd27c41f6bf82cf7e31db705495e146a0a32136e94a95d985d77e16f8d41e7

    • memory/2480-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2480-94-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2988-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB