Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    03/06/2024, 14:11

General

  • Target

    9211a9c880aa525e9063514445413024_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    9211a9c880aa525e9063514445413024

  • SHA1

    581a343695aa68366ce73adf0b9729bd4ee52f74

  • SHA256

    fba955bfc7b53fa25c90e9dbcac244330ce899ac7a81bffd1f842d0f3f61f4bf

  • SHA512

    3dd0d647cf835367db06a339530b5d6754ba5a3cc3987ca77323de7fa9ae8c3aad7055ed4f9df74b36b29c5956913b8f5229da989770ff64aee3d996626b2f10

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6F:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5A

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 33 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9211a9c880aa525e9063514445413024_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9211a9c880aa525e9063514445413024_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Windows\SysWOW64\mhrjvtpsuk.exe
      mhrjvtpsuk.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1156
      • C:\Windows\SysWOW64\wigffenq.exe
        C:\Windows\system32\wigffenq.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:2560
    • C:\Windows\SysWOW64\dxfssrpkxomkjqd.exe
      dxfssrpkxomkjqd.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2644
    • C:\Windows\SysWOW64\wigffenq.exe
      wigffenq.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2748
    • C:\Windows\SysWOW64\fjedkbvckmqst.exe
      fjedkbvckmqst.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2668
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2088
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1036

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      124130c3cc1d6caa884363db91f91869

      SHA1

      15f8f177fdfea13b411fceb1414805bc64f0826d

      SHA256

      6bcd841811dfddebd9d57c3aec9a44b7a88f13aeeda2939eac3b00240ffd6bd7

      SHA512

      40a223913d36e943c240c350fc3c38c70faa633982e24840356a7a79e2a2fb778b2e0462f0c905cfd2a3e4cae6642f53797a33ce4bd3380b4613e7a6742ac401

    • C:\Users\Admin\AppData\Roaming\CompressFind.doc.exe

      Filesize

      512KB

      MD5

      ad5abb8a468b66529def6f53e4f3387f

      SHA1

      8c702c524dabfefbffa5061075bed1eb16049b70

      SHA256

      86ab8d29e92d1592be5045de077b1525980ee9f61d16b2f4da70cffef14dd474

      SHA512

      9dbb7de21265e822a63fe19fdaa1761c09d4fbdca8903ad32f098d7c943dd8802b949686fcaa9398c7d7fd5b04def4c6628000b0e26677f6edc090ed4272c832

    • C:\Windows\SysWOW64\dxfssrpkxomkjqd.exe

      Filesize

      512KB

      MD5

      f5ebadedab603ce0718a0fa854a58d9a

      SHA1

      77c093d758bb14f0e55d4e85a745e1de9489c178

      SHA256

      927fad73ad6ed206dae588e6c51f3d78ac56f86844eaa97647552b2bc16d982f

      SHA512

      6d91e50b11ac49a425f132b24c90c68e1d8d2e140f3bc17db0743b589900df4a999ce422c409340ff36d9fb14819d474d3207bbcf29dc4928d9fd8f1b5b4ff2f

    • C:\Windows\SysWOW64\fjedkbvckmqst.exe

      Filesize

      512KB

      MD5

      b7e3d54a8a34046960c1329a1b464a36

      SHA1

      59b7a7b3780dc477bdd2e58f7998c8d0597bd888

      SHA256

      5ca624c3cc9d8d1a27474a9bcd30c3ae53f2dd24fd9de2ab7bd238b096d6b387

      SHA512

      1fc9e319bf00432d89d64ace2668f6e7e5b0c2ead1014a51ee0633e696523388b7f19d9d5fd08f43c5b1506ee46a6a52cdff1f36c44642335fc2cc5c1b906615

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\mhrjvtpsuk.exe

      Filesize

      512KB

      MD5

      be8d35e1107e713b2de2d73e8d87fa7a

      SHA1

      1b6a0eec5ef5ee882a28317b781e28559c44f676

      SHA256

      44cbee1c570b2b677229f63329df25369e5aa7f53be5fa355ab4e7e707606b24

      SHA512

      4891712c3a04444048f0d9f54fc34212b54c435e6814fff2a30f13340a000a896f8b6a4c178862367fc01874275b1f1d052e9ed40cb82c1bcbb4ffd876430015

    • \Windows\SysWOW64\wigffenq.exe

      Filesize

      512KB

      MD5

      8e3acc55c54e0938475d8dc3f9a21ce8

      SHA1

      bbaa1c1407717f1afa1ab9890f16b5d4ac4fbaf7

      SHA256

      49bf4ea6b89465f65cc9c41006d5bcd63b3b6329781b24cf3e6ccad7e2db717e

      SHA512

      3733386e9381e933fab4d9f03abf29bf82daa3e38b3b63d0078e3dedf81a8aab5bff1b22e82be6dd32484b6b824c77db76d6665817840d86fd1e5b7469421c9a

    • memory/1036-84-0x0000000003D40000-0x0000000003D50000-memory.dmp

      Filesize

      64KB

    • memory/2700-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2964-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB