Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/05/2024, 16:25

General

  • Target

    138ab3851b1cac597608dc4d81e7c3b3_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    138ab3851b1cac597608dc4d81e7c3b3

  • SHA1

    5ddac8d67e5ebece0c9e7d510501e60d17da19ca

  • SHA256

    7ff0d48ada976ce610b07313fae99f552d9a5fc983c712075e37852f0a4ecbd8

  • SHA512

    78384fc156d4b9cfb49a4c37f8202696458e83fb72677655ce518511b5731b37f8e7aee8f1041f4dc9a97b8489bcbf2e1eb4f973f437eb44a0e43b23f94877ed

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6l:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5i

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\138ab3851b1cac597608dc4d81e7c3b3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\138ab3851b1cac597608dc4d81e7c3b3_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Windows\SysWOW64\azmgowqtme.exe
      azmgowqtme.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Windows\SysWOW64\fftdnzyu.exe
        C:\Windows\system32\fftdnzyu.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4388
    • C:\Windows\SysWOW64\ebtpualfgsxvomc.exe
      ebtpualfgsxvomc.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:696
    • C:\Windows\SysWOW64\fftdnzyu.exe
      fftdnzyu.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3352
    • C:\Windows\SysWOW64\bccqdyuiudlbc.exe
      bccqdyuiudlbc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3332
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    26f4f2ab6310bf2bda79dc0056c90939

    SHA1

    e34395b92b0e0082e4e15e8abeb3c55d4799a28a

    SHA256

    108fbb1624758c13423c4da4be908fc4aae87e7cf3f7a9acec059fdadc807b46

    SHA512

    c5eb71b7e49de552280cf9bddaaac649e3d9f9a35e25c1bf78622384bcead095be77a586c1484e8c1fee520814aa21da2590382b42dfdd515f5dc5f670666c30

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    0d8fd5efca3256ec4262a9fab9ad4e19

    SHA1

    31f85b061df9665bfe9a707bbded5494f36e0f5d

    SHA256

    b7a79b5ac2b66c743d27ae667c15bad471403a19568f78b2d18dbedd417505cc

    SHA512

    c57042f123a2bdd6abe7172b54e29c052eef22c1d5e3bfa46e6cb222853102444dd8568048ef97d8bc893214b063e3e82e3f230b7b46decdbb5e236d3876f792

  • C:\Users\Admin\AppData\Local\Temp\TCD7EEB.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    9ca2c75639f0b977bb947cce9800f6e4

    SHA1

    bc017f65459fcfff2b04a67e5f3a8500f9b92fc5

    SHA256

    906b77931c6f5e95df82ca9bb19dda093dae5baf2d8757707ff7ddf099be6d6c

    SHA512

    c78a01c27dc40004765ba6aafd84de4bcf769bd483e3ac7bab9935230c9f063c8c88d969f5cb361699392e55796ed5c0ed35e2e2a60c854f7e9823c2923ecb0c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    db9e097b14955df7cc3bbaf0596fa57b

    SHA1

    0bcc782d943f99754408538e4261f38b70841dfb

    SHA256

    14efe0830f76d61c798b208199ca79727055f0f0ed3ecab4c25f9a89b7093c89

    SHA512

    d6f6edf8a2883eb03dac094d6f494a7405971d71c99d0d664fd6680d906d68d26d0cd35f72db4881b561a36862cd5828e5399b4ec36f1c800d7ebd1dd6184d71

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    fa0784934a37aea98e3e4a51c2419279

    SHA1

    afd76127e0f9ea8aa808c2a683399a28c1f90d86

    SHA256

    e40afd1dbeae7dfe6b92bbadf693aea484294c57faab8d32c0c2bdebe6b1f9ce

    SHA512

    090b0f3e1b3e3151dd857e93fa14a0b0e5adc7805b01b0f686ed72bae563f5a34d66b15f13a5a82b6a5a67286bfacc4ba7941b2a47923d7aa8b74a3d6d14f01f

  • C:\Users\Admin\Documents\SendRename.doc.exe

    Filesize

    512KB

    MD5

    2680f8addcfab816244c749c8a6df1da

    SHA1

    378ec380054e5bac4057130aaa2192d471264193

    SHA256

    2d437771b3edc12b037beb883a1cade0b8771cf1db4bd1644d68a93aa71b34bd

    SHA512

    0bdac4b7180104614bf8bcef43097a7b5203f408ceeff8d4595405698c8a0c96f07e162622a26bd324b7f21b913556e25906badb49f7e1ff3a41c6c1f7ca8e85

  • C:\Windows\SysWOW64\azmgowqtme.exe

    Filesize

    512KB

    MD5

    097b982b6d3035f8524889bdd3310fd5

    SHA1

    156c48386849c4e855744a27ea998f7ef3ef25fa

    SHA256

    8f3c9930846477f45aef99848a326b266b1e9bbacd7f05369196fa5ce00270f2

    SHA512

    b1444cb284ad5c8e442d00eb6d47d8420e858393451e349851b90c45491c3cda5912d725762ef2fde7a47a4a37410bc3462dc903ccb27dc04cfeb7088d4ce0bc

  • C:\Windows\SysWOW64\bccqdyuiudlbc.exe

    Filesize

    512KB

    MD5

    fca478482a9288e56c753798c312830b

    SHA1

    0547ada3a34fa3c1e6db1bddc2b26356fa32cd6c

    SHA256

    1dfb8b47d9b36a9c722a9ad8e787f3be0a3fdd8f357de62d36911e9e797fe742

    SHA512

    28ad6a3957b31ff25d1c3ca0baccbef7f498a3eb083ea5b2a0b0df74d61591527b46e4e281944859af58572ee1b7a053e00d1bb2a1283ed7476b91aaa3a8d789

  • C:\Windows\SysWOW64\ebtpualfgsxvomc.exe

    Filesize

    512KB

    MD5

    29e7f7c246e3ddd16dfcbd4924369a79

    SHA1

    fa6710c637cec59a177ea3846b41cb310445c5ef

    SHA256

    d945dc683f0bea5b745f6368121a17388ed81bfb9d58bcaff203ab33332d149f

    SHA512

    61c25c7d0686dbab5ea9279a830d59f241f9dbc97e2e4b7903de2201f10c92b3e7328b2704de6588fdc93f9e0c01af66ae4c95995599bd5f4d139fb1fd49280e

  • C:\Windows\SysWOW64\fftdnzyu.exe

    Filesize

    512KB

    MD5

    a2d2c62bfc2ba71e02744d94207b61de

    SHA1

    f49fe7bf8c9066bd9699aa62302a833c2486772a

    SHA256

    bae8cd16e3e4d4b0f7f689bee5ed9434c582a1f463d06d3f6c7c4006f93e0f3d

    SHA512

    ff2815eec6d7654c71fb759d5ddd51f7420e8bdf73e51a52c6ef36ab45732f01d2aa661c07b29e1cb4c17b1a1bc2802903db022f36f0da5f4d24ee915fa96111

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    4d49153a2093fc80a6ff1f51590f3829

    SHA1

    1d20fa19cc564464e7c5bae2aff293df63cccf42

    SHA256

    9a8dffb20770a68badfd9b5251f28a1ef9e99a2776148d20031b9b479fa523e3

    SHA512

    7dcea47ed062a63703e42fbbff43aae63128c3741c9198a7c4d42a196b783609931197811fc6bf29183bd6ca60124cde36595a2d77d30a89a038fea4a25e11ce

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    d0b7a3f598c6f2cb00fa1b9a623e6d7d

    SHA1

    64f5a9b91b53a489556e2bb756befd40c9ffc1d0

    SHA256

    a712f4c7dfad6afac28bffa324c7e18088e1f0520325689aca2a5f613c391769

    SHA512

    2048158b701096272f276e67f1421048a8b98657746a66f25f6489afbd8c201b0fffff2974d9537be04cb502f6bea5a4cca43e33f2d30795b930e71589b08d6f

  • memory/1856-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/4456-37-0x00007FFBD2750000-0x00007FFBD2760000-memory.dmp

    Filesize

    64KB

  • memory/4456-39-0x00007FFBD2750000-0x00007FFBD2760000-memory.dmp

    Filesize

    64KB

  • memory/4456-36-0x00007FFBD2750000-0x00007FFBD2760000-memory.dmp

    Filesize

    64KB

  • memory/4456-38-0x00007FFBD2750000-0x00007FFBD2760000-memory.dmp

    Filesize

    64KB

  • memory/4456-40-0x00007FFBD05C0000-0x00007FFBD05D0000-memory.dmp

    Filesize

    64KB

  • memory/4456-41-0x00007FFBD05C0000-0x00007FFBD05D0000-memory.dmp

    Filesize

    64KB

  • memory/4456-35-0x00007FFBD2750000-0x00007FFBD2760000-memory.dmp

    Filesize

    64KB

  • memory/4456-610-0x00007FFBD2750000-0x00007FFBD2760000-memory.dmp

    Filesize

    64KB

  • memory/4456-611-0x00007FFBD2750000-0x00007FFBD2760000-memory.dmp

    Filesize

    64KB

  • memory/4456-609-0x00007FFBD2750000-0x00007FFBD2760000-memory.dmp

    Filesize

    64KB

  • memory/4456-612-0x00007FFBD2750000-0x00007FFBD2760000-memory.dmp

    Filesize

    64KB