Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/05/2024, 17:53

General

  • Target

    6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    6bc7146d386e26ce3ce7519cddf3938b

  • SHA1

    81866157e77f2df4840f23a2f14a38cb85574e1f

  • SHA256

    ea38bfc76603bf0d69cff913671ebfce4fcebfb9574e99754dcf017427360155

  • SHA512

    89b090580e532c508682ea9acfac942d2d06a90a984614ad4ad7743b7ffc995c712231c62d14424eae9d2b6fafcbacc5302e9b27438fd22762fa6ebf3e4e9b37

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj61:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5O

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Windows\SysWOW64\iqfeqkumxj.exe
      iqfeqkumxj.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4944
      • C:\Windows\SysWOW64\plhpnbid.exe
        C:\Windows\system32\plhpnbid.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3140
    • C:\Windows\SysWOW64\bemujughgqjkhli.exe
      bemujughgqjkhli.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3620
    • C:\Windows\SysWOW64\plhpnbid.exe
      plhpnbid.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1836
    • C:\Windows\SysWOW64\sjwqzmjdmuwwt.exe
      sjwqzmjdmuwwt.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3040
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    c382e43ade23edcf7d6125d7a603f35c

    SHA1

    8f16bac49980f3f1f19ccaf711755f1d1a08d658

    SHA256

    a11c092ec39d5863abf718438cb0f7567c84439da37f48d6974b4c5c961c57ce

    SHA512

    c3a8e11290b1e524185cf1c6d3e63c280c74b9cfa38ce8ca5e1b318d94a926c51311f888c832b6d5ea5a65d5f65d594e3ae5bcc04975cee002c2066b955bbc47

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    6fa0e361fb800f79d5cfa10b521eba5d

    SHA1

    de2c4ee20d8d604696c0af1c3663b83c4d45de73

    SHA256

    d83ad49564a7c0c82d0db6462c1708e3a2062eb03c503507c5677dd3b6706350

    SHA512

    f9270c008c29caa33f4afce88ab06c6ce6c4e9e89958e35fbe5fe274ccc3f163aa2c3bc4722b8087aef54f3131ebe4a7e1733b592a953892edba59077e6c2ec3

  • C:\Users\Admin\AppData\Local\Temp\TCDBE0B.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    c807382cbeaadfa15aed12e6c04410fb

    SHA1

    19ba453f1f3752c6224d1cd24000845264824847

    SHA256

    b0a85c61157f2c0f0a7adf982a08d3169770367a0ef0d2f180ea29bae1be0c76

    SHA512

    591a1a032b86d0e1ceb3768297369bb9dcd7b8ec3de0f7c8b216c67c140a9ef3cf28ee770c40bef3295a4cdd89936bbf00623505d9c220a913b214e40ef2a860

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    d48c9bf8f2810cd24beab4c8461d67b1

    SHA1

    fd4c5a2dd7f71ece7fdded063733a3676a791145

    SHA256

    fbe84041f594c3ddfec33f4c88487e9a189f9e944f063b16bfb6c51a6cdd5b71

    SHA512

    7cc8609852b5acb27ab14761884438ce65b90015556d21a2d585c5587a6fbb571f79363177556f1560727301f357086ad50e2d02a845d964651c98f556df6fa2

  • C:\Users\Admin\Documents\RedoUnprotect.doc.exe

    Filesize

    512KB

    MD5

    13390f1e48436bb4514d0e8991dc542f

    SHA1

    beedf05558ffe6d08abff4e3fd7450981d3b5fce

    SHA256

    ec0a1bc8852931bc15aaa3e1c9ec2edcb5b31f1313c5b37ce38e7a1dc6bea47e

    SHA512

    f6600037879b2cd23d2a60716e0dce8c27e19978a8aaee066588f213262a83ab6dcce6d0be37623f2cf08291f4acab4908fa0cb9ef9ec7de039fc537bcd92a57

  • C:\Windows\SysWOW64\bemujughgqjkhli.exe

    Filesize

    512KB

    MD5

    65b853b2baf8a2ebafcdce3ab898c9b1

    SHA1

    aa9995beff690b6da9613216365a88bf7256e408

    SHA256

    c0b6c7ede2ac40c6878a886a8e51dad32fc895234190620da0382ed1f2057acb

    SHA512

    ccda78425c185d91ee3597708ed3e29ab22f3919890a2a0ef749e19029b70f3103f39baeae5842ad5e9e351d53b82c635e7dc9661bd1e4b249dcc0e7231f08f4

  • C:\Windows\SysWOW64\iqfeqkumxj.exe

    Filesize

    512KB

    MD5

    7c7744424a8e1fe2a6d27b5692950b02

    SHA1

    233987a130fc2154f7dff4c9b1aa08f3e957e5bb

    SHA256

    449aad4aa9109ea4e2d49d763f7c8f3b9c99b158c7a174f0c7da8f1d8c09d9c0

    SHA512

    bbeba5fce910d24885108832c1434bc01a5ea208c177ec47a935b7e99e010c9225b5d70b888dbb26ef11022e4e1d2a8a2502b25d9e1f601b58c2da6b64c996b1

  • C:\Windows\SysWOW64\plhpnbid.exe

    Filesize

    512KB

    MD5

    97e2c1f9f4f7cab72ec73075fef5096d

    SHA1

    516185cdd49a6d81bbe43ea7d6f213b5bf3546ba

    SHA256

    317b9e41b423f4c895e98909a8098df30b22dc454d31940378dbc28cdbf19c8c

    SHA512

    4684786be65848929a362b678eb93dbae10235050b69b4a6c4afd558dcbe123a55f8f00cdc7cc8dfbbac632706c572198aae1a2e484085e5d17c2d461a5fb76a

  • C:\Windows\SysWOW64\sjwqzmjdmuwwt.exe

    Filesize

    512KB

    MD5

    b2b631294ffe29c5024f75cbf7874acb

    SHA1

    d3e832af27455a12d3e496ab0d37807ed54356d1

    SHA256

    20d0202b2fa0771f2dddc3a1a7632c4c8685f5687b16c70c5a31e7281140ab07

    SHA512

    8678e63b1cadb62969526c3fd7c286c303c9490256dadb76b5e68fb831bbadd01f7f71167d9a7282db6de8fb47129f92a16cc0d5a2433665d8423f041b6a5d22

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    344ff4674b47585dcd3d0348b0312970

    SHA1

    29ecd22d7673e02560d102c04b2a383a14119bdb

    SHA256

    e6a10df354e6c6ef1ee873ba1aad5a0188c902dd03ee840251ce8fb010bd0934

    SHA512

    02dcf164a56199f46f850f73cdd2348973dc1f341648565f559adb57e5c3e4d8bb5ad5bc29edf4a737a08a9bae13e4f312ad3f89aba5759cec2a3c504509f226

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    def0ffdb9afc24038d59222a93060a97

    SHA1

    dcb8499ca56d9e5529d7d98b185aca9da05384ce

    SHA256

    7a46f21179bf6fa236f89af081282fa62b25172248b761df5a3fb0a11fc03dfd

    SHA512

    70dbc57bada271d4bb92c67bbc314f0283c0f1c02efb91d2957063c0b0b0e7ea98777bf724d0e1f06c137bea35022b872a3c636aeb0fe5baea0e42708e2a29f0

  • memory/1508-41-0x00007FFA259F0000-0x00007FFA25A00000-memory.dmp

    Filesize

    64KB

  • memory/1508-40-0x00007FFA259F0000-0x00007FFA25A00000-memory.dmp

    Filesize

    64KB

  • memory/1508-39-0x00007FFA27E70000-0x00007FFA27E80000-memory.dmp

    Filesize

    64KB

  • memory/1508-38-0x00007FFA27E70000-0x00007FFA27E80000-memory.dmp

    Filesize

    64KB

  • memory/1508-37-0x00007FFA27E70000-0x00007FFA27E80000-memory.dmp

    Filesize

    64KB

  • memory/1508-36-0x00007FFA27E70000-0x00007FFA27E80000-memory.dmp

    Filesize

    64KB

  • memory/1508-35-0x00007FFA27E70000-0x00007FFA27E80000-memory.dmp

    Filesize

    64KB

  • memory/1508-604-0x00007FFA27E70000-0x00007FFA27E80000-memory.dmp

    Filesize

    64KB

  • memory/1508-605-0x00007FFA27E70000-0x00007FFA27E80000-memory.dmp

    Filesize

    64KB

  • memory/1508-606-0x00007FFA27E70000-0x00007FFA27E80000-memory.dmp

    Filesize

    64KB

  • memory/1508-603-0x00007FFA27E70000-0x00007FFA27E80000-memory.dmp

    Filesize

    64KB

  • memory/2412-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB