Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/06/2024, 20:36

General

  • Target

    9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    9bdb6e7a9c1c6f4547b76ee2b0c6f665

  • SHA1

    14487e1f023d30de31b7b90b033e5f501c7ab69d

  • SHA256

    eda405e15c812864f5f761e97a84f42403c96501b907715258702f802ed28a21

  • SHA512

    fa7fae7f6c7be54b355aa3642a7d827a0dfe7791ad112bc185e9d3b9ba35cddbd5cce543a0ad859a84e6f613b95951e2122a030724ad00be7db2668ce2d0e54d

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6F:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5e

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Windows\SysWOW64\msieaqvfes.exe
      msieaqvfes.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Windows\SysWOW64\ofzpabow.exe
        C:\Windows\system32\ofzpabow.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2464
    • C:\Windows\SysWOW64\fmymdlvqkalljqf.exe
      fmymdlvqkalljqf.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3060
    • C:\Windows\SysWOW64\ofzpabow.exe
      ofzpabow.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2636
    • C:\Windows\SysWOW64\vrfwtujoyqqbc.exe
      vrfwtujoyqqbc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2592
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1448

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      f5751ef2413651c7b2bd02d7727d7a0a

      SHA1

      3a4bb034da893204ebb58ee9ada841727781e4cc

      SHA256

      bac4c8deaf582df519b06634fa29978083acdc15c5899093753ebb3e5669d83d

      SHA512

      2d17ac3cadbf545800cccb8698374fb78cd63feaa384ca36377168c807991a1265a5e898e1384fb1bc5ebc25bf7c9eabc8489cdd89b0b5d4e44a86796a35d314

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      a88acbd4148f917b518a4570963700c3

      SHA1

      05fe20af0f2f37e553602b3e2e2d6b548e0044da

      SHA256

      9eb9b41036ab87c6841d7f7d4bf2b8ffbdbdd445a6e0b1b9e88a2d4086ceb5cd

      SHA512

      de9e665c2da930966e3df4a252b88e23c4c5a1c335bfcc089f00fdba311a7317784805a02e1daf04e2df6d6759c8a1396308fc761a0c035bd9d49776e8ffb47e

    • C:\Windows\SysWOW64\fmymdlvqkalljqf.exe

      Filesize

      512KB

      MD5

      d5b2d2d65e1f3ff6cba71e3e3ecd24ba

      SHA1

      fee9f430a4944c9418a23298182bc1cf787a3612

      SHA256

      20cfc653b3e834e90e8bffa2f0f716330c0a85490014f05e30f685d379da3575

      SHA512

      bdf73a969c5012eb362548c70db985b115fc1119ba45e8f032378d9a3bd2dab9fd1e883b680e87b0adb266eab0e4520551509dea4efcd986e369dc7db576cbc0

    • C:\Windows\SysWOW64\ofzpabow.exe

      Filesize

      512KB

      MD5

      ed865b50543b9347b8b95786028c9e8a

      SHA1

      97627d5bb371f008006003bad30f93f57aca4d08

      SHA256

      918ead655761c7f22068c635f768f4f678cbf1e39d10cb681f63bc1a86907bdf

      SHA512

      035867709cb79f04de4192f62e9aa8ccad2380e4fbaa48ff61d8247af488e67021942377c75e960d0ca8d54d86b67f7a0acf8234408b335476f86bb097311207

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\msieaqvfes.exe

      Filesize

      512KB

      MD5

      a2d09f62ef0cc092715daa31e0ca700c

      SHA1

      74a2d0d2ed36304740bab26ac093eb3bc827f71a

      SHA256

      4fb69d0bc10d841b645a2c05f206091e0aadbdfc2c62114a9502fd010bf0d415

      SHA512

      5d7674d3875e24b124d550f23c3c5f4276e9abe1d1219841b034d6c23ee2b8b09bc12b86b1b853f042daaf815049d47233424299533178fbb2b7f6886ed7d082

    • \Windows\SysWOW64\vrfwtujoyqqbc.exe

      Filesize

      512KB

      MD5

      db612a23731d015e325aa4bccdfd5830

      SHA1

      7cf579b959ce2c25dcc90dca3058c9e0b73f4b69

      SHA256

      7ccb1629bde8e00d037d78a78b990dfb622121f04b4f2aff2b01d32583bc6951

      SHA512

      b5777b3bbab37fbd17275c83dcf4e96b991b3d4736f617c107b684cdb1e17c14b8d2094d0ae71381c484d92d0bd066a9665a2ca9a54fc848c8f7a8415f0eec99

    • memory/2552-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2552-98-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2844-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB