Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2024, 23:09

General

  • Target

    824784ab25d55d41cc738213250ea99c_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    824784ab25d55d41cc738213250ea99c

  • SHA1

    990a124cb1294aa5af36ff4abcf8dcdf9bee5509

  • SHA256

    03c19f0c91c7c4c1b928a84b5ffe9e1c1d49b8be5ea9cadf32a92ca2344dcfbe

  • SHA512

    de5672a96ac53f8424e860889c04cc936c60f8a259019635b0931d69e02991c1dfe7247425ad8cf2bcd2dd8ff5923394120531339bc750e357b5945dd981fc27

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6z:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5o

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 11 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\824784ab25d55d41cc738213250ea99c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\824784ab25d55d41cc738213250ea99c_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4332
    • C:\Windows\SysWOW64\ncrscdttld.exe
      ncrscdttld.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3560
      • C:\Windows\SysWOW64\yhefxscu.exe
        C:\Windows\system32\yhefxscu.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3920
    • C:\Windows\SysWOW64\faufmyzfvbhopai.exe
      faufmyzfvbhopai.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1528
    • C:\Windows\SysWOW64\yhefxscu.exe
      yhefxscu.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:860
    • C:\Windows\SysWOW64\txktbcddhikgt.exe
      txktbcddhikgt.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4064
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    f0ed808d7394b416cabff10a568c0a40

    SHA1

    cab2098ade339ec40f7c3c8de33de5ff8c6a2e5c

    SHA256

    c9064362ee4e01bd8a7a1b96cab3cb59f36e77d771370004d2b8ef0c34f50e89

    SHA512

    7dd0884eb07ad678efc08289eb0922c0e00c0fc733132494309f60a1011df664dd8d253661a7931aa408036e689dec8393f69287375e42c2534bc20701eeb3ce

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    a99d19079e79a9c4665c520dceaf6716

    SHA1

    40a6b55e81af553c465d075722f572e43f463d60

    SHA256

    eed6a175f2e6c634c11c48ed6d1ab695afebe30d695f872381be552d1bc24bc1

    SHA512

    ea70e081663b06226cad1ffddb17540120fe924bd1b970c8552af2663637c410f6259a3ff2deee26a752832b3f65b133a400b27346ad5161977055e75283e60b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    2fae0fe44fb67ed515b21a2b6fba40e3

    SHA1

    d39c4cb134c596851c157406149129a69844613b

    SHA256

    bd528b67c4e7b5924426cb6edc6bd85896db3a43e596bc76d32632d33eccc2b1

    SHA512

    9902e514810847d11b83ceb64209c7a363f3b482f5444474673988fa0729295d8612ae6aa0d81a09d9adeb958f7e0251b414ef808f82f279df504bc04a347087

  • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Bibliography Styles\TM02851223[[fn=iso690]].xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    b102da7262fa5da2a63df1bff772ff6a

    SHA1

    3658deeae16b760fef297a81926a5a0245ee9bc5

    SHA256

    e72eb3b2bb8d3424b777c62de100a7012f22122da6cc550c291279cc864edc8a

    SHA512

    3a4e817672cc9df7548ed06bf01a42f0698a8457630772bf2ec134ccd45ac8e92ebda6b25cc48bf67aa384caa4cf8cb71e4a4b788ef80b146551041fb372f9d7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    30d8720fa0b24a6a39cb77586f4ae44f

    SHA1

    f6912f0d54f415872fd332046a3d029508a3e8da

    SHA256

    ae6fecb608e79d7b047a0cf6f01a404f5ab94fe9781e083c950289d7a5ef0256

    SHA512

    34e27dc788c6925170fe537ea72c6dc8218660240ea67804436160188abc37c09f226ec4251c5071e9692ee4c6866dc6b04bb49e8adae6ed8968b4253889b600

  • C:\Users\Admin\Music\SyncHide.doc.exe

    Filesize

    512KB

    MD5

    8dc03d820202ec67d5836465df038cac

    SHA1

    0ce338c8cd466cc3edc5f0b5508f21305860db76

    SHA256

    723f5317bac3acace556f48a9daa7ef581aef13ccf8208eae2829d6878fe5a7e

    SHA512

    d1c2b49948886d7166497c8a6df415fc19ca8e45e855e5308e50e31f74767d55401c88ecc0c2870a835ba86e6b9033df54426a7176ff743a920413c94983289f

  • C:\Windows\SysWOW64\faufmyzfvbhopai.exe

    Filesize

    512KB

    MD5

    3a0ca805621b9408386acf1831f2fa3e

    SHA1

    b5e594a4fd431c5ce400cf74ce5ffd7ebab74ca7

    SHA256

    972039b221211e998a82431d9c8d29b7005a42305c1b021c8b600e00b427d70d

    SHA512

    5cf1d1a685a06dc09a9991fa262b2e52bb3ccc458e4c006c820c23833f32c21d01e2b1e418de7c746f5aae61de8acfcc8571436f87e066a33ed0c73fccd6b426

  • C:\Windows\SysWOW64\ncrscdttld.exe

    Filesize

    512KB

    MD5

    999160150c3b9437db280a7aba2fe230

    SHA1

    47961027a7e72a6de7aa8982e62f279dc9d12773

    SHA256

    6b6e6c40f1f7cd887ae49a886291ab390cf9aa563a8579cdbdf9af3b7e130678

    SHA512

    370fd412a7ad60ce44b92993d64984a7d2d15ee4037a7196bd713ea0ae284b0b2503d1c6a4666ed6344fdbc6fea9f445d8f2b0b40927a579eac838d937f95cc4

  • C:\Windows\SysWOW64\txktbcddhikgt.exe

    Filesize

    512KB

    MD5

    2fd86210e9b9475e621c3b402358b992

    SHA1

    503d30a44c547b00f59ce9976e234792b94cf238

    SHA256

    34d515ce94e4a6835eb46f396ebb13ad3b973253993c2ef99c7edb102f1be121

    SHA512

    e29bc6e45c8c940f51d00211c943b08f8bc2b56cb44a43cd3e9337998d44ba80e9284b68765dcaab8d423c4557ac1c8e24ef3d69a6ee5d4bc22d00de1f1090f8

  • C:\Windows\SysWOW64\yhefxscu.exe

    Filesize

    512KB

    MD5

    c574bb8c299bb96ad673cc888dcec1a8

    SHA1

    ac466e4616d37c0951d7bc424035d3515d8b085c

    SHA256

    a64424ffdb2bad8cb6721d12806a19ff624f76f6209719b3b74209bf5d1398fc

    SHA512

    fc259defb4901766e01dcf26586d771856ba43a282875cabcb4a827f3d2ccc2c68a1552dee93d36fed345daa0124d9f70fe8a005d23d752283e1d2b1f39ed836

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Users\Admin\Documents\CheckpointPush.doc.exe

    Filesize

    512KB

    MD5

    321ed26206d763a7138b89dc05c532b6

    SHA1

    5c28e7d4d017d12686a816e6bec5d23bc9aa357e

    SHA256

    e7afb0145bf07186aa880007ab64e670f6d4651808ccfcf2d85348fa118a0be0

    SHA512

    7d70042adea95937605710fdfeca90cb2859fee58bde312124ce3c0c1c8e97ffe3995eb0756e0a72462e11f034d4b73d0fbc727509889f9764b6c6001e2f0edf

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    506ae4e3289adde1ae84bfb5234c2053

    SHA1

    77acedd2ee4aa2edbfbfb210b62c8b65e7b16184

    SHA256

    0f0fd09a8da792fc2f1f9bbfb626f0d318eda5394af3ae02442bc8dbec70967a

    SHA512

    b685c9aa04ca8bfeeec5e4d56d99044c6edc3d71e3fec5575ad0c40954f525179009e0bcd9d79a298c74fe7fb476f0b8eb549ebf10fb0615795c1dd1ccef1960

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    b78b6737e08d3454b3ca4c7b11fe4c8a

    SHA1

    1812b6fd8b6e0700f3c064f23fad0dab6b24e17f

    SHA256

    11c1eb99f0264b77c238b2110ba8503f332344b42d58bd2a0c103be64396f706

    SHA512

    20ef761f33c5c331a14007871ea5c61269a7e1bfd148fbfca9d40202e8771534f4c001109f3bae795f31433b3cc8f21f42d33474264230a84264de6b5e02f256

  • memory/4172-38-0x00007FFA2A430000-0x00007FFA2A440000-memory.dmp

    Filesize

    64KB

  • memory/4172-39-0x00007FFA2A430000-0x00007FFA2A440000-memory.dmp

    Filesize

    64KB

  • memory/4172-37-0x00007FFA2A430000-0x00007FFA2A440000-memory.dmp

    Filesize

    64KB

  • memory/4172-36-0x00007FFA2A430000-0x00007FFA2A440000-memory.dmp

    Filesize

    64KB

  • memory/4172-35-0x00007FFA2A430000-0x00007FFA2A440000-memory.dmp

    Filesize

    64KB

  • memory/4172-40-0x00007FFA27CD0000-0x00007FFA27CE0000-memory.dmp

    Filesize

    64KB

  • memory/4172-41-0x00007FFA27CD0000-0x00007FFA27CE0000-memory.dmp

    Filesize

    64KB

  • memory/4172-609-0x00007FFA2A430000-0x00007FFA2A440000-memory.dmp

    Filesize

    64KB

  • memory/4172-611-0x00007FFA2A430000-0x00007FFA2A440000-memory.dmp

    Filesize

    64KB

  • memory/4172-608-0x00007FFA2A430000-0x00007FFA2A440000-memory.dmp

    Filesize

    64KB

  • memory/4172-610-0x00007FFA2A430000-0x00007FFA2A440000-memory.dmp

    Filesize

    64KB

  • memory/4332-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB