Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/06/2024, 06:13

General

  • Target

    a8477d3ca529aea43cd06a3e9e70360f_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    a8477d3ca529aea43cd06a3e9e70360f

  • SHA1

    1785efcb6447185043b5c0501b232f2229df9d4a

  • SHA256

    88c224d410f03525341083253ab2a38f460f613cbeff633aee88c7af00e7e7ee

  • SHA512

    2b630a32f5c1a972dc356f6b7b249c131fd240d8ba416cf6b1e2264548de897482b4dcc4f36021b668d0d3443ef4d6d6815c43d95fcac13ad72ac276a2f18e78

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6t:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5G

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 11 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8477d3ca529aea43cd06a3e9e70360f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a8477d3ca529aea43cd06a3e9e70360f_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Windows\SysWOW64\drqhikzqub.exe
      drqhikzqub.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4136
      • C:\Windows\SysWOW64\chsolqgd.exe
        C:\Windows\system32\chsolqgd.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:332
    • C:\Windows\SysWOW64\buzkibstegxxtix.exe
      buzkibstegxxtix.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3316
    • C:\Windows\SysWOW64\chsolqgd.exe
      chsolqgd.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4892
    • C:\Windows\SysWOW64\bzsfnrzoodzet.exe
      bzsfnrzoodzet.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:116
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1112
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2428

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      3b4bd301a971e1f05b681f8e7146163b

      SHA1

      e2f39242c838329c0cb9d667aa1afabf444c80ed

      SHA256

      bf07804d5199dd087a971ae5d85c0eb1fbbe163674607df08aa9a418db95955f

      SHA512

      7e55186796b98f85835534e45ca23eec4b71dfb7bbca1e25347c9fc36f46e1b43cefe0da678abf24665806be103cfe2263058b62611f058420e8b0a6a6b8c63c

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      bc2d262188f2e458c2a42c54c3aa14bc

      SHA1

      661fa932586148b42d3713789500982345c186e3

      SHA256

      0fda2812491b498cc47c438fb1c4ebbd3498135137be9654cbb9c64d74206d19

      SHA512

      51569c02f5d7b256d26e0c7bd2ebe1fc2337b98a99f3ec7efc6e582f2e6092cbc20037d6fecb5fd46560da36be2614292c159cff510731b798065d8ded33b683

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      239B

      MD5

      12b138a5a40ffb88d1850866bf2959cd

      SHA1

      57001ba2de61329118440de3e9f8a81074cb28a2

      SHA256

      9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

      SHA512

      9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      dc1cfac16361b80f97ee0ab5c91f03d9

      SHA1

      7a2801177f93e72e04a94dccb8f45f004a3cb072

      SHA256

      51217337de93fb69e11df24da841f135dcaecb0eba1289a870c1a67f5816ebc8

      SHA512

      a854a9e9bc595128b9b7fafe9086ae159caf58b471e543ebb26a302107bbcc701b8e3b4665268a5b9599317520717cf4cea8f8d70a56f7413cfc26f8c0f3e132

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      720b07a0467fc72a940ae0aee77749be

      SHA1

      795726922f5a12ad19bee1d7c8ed0e088b03eb65

      SHA256

      ebe36bcb704db0adc895ce55df1150b9facfe9581b7df165b845c64c6099708a

      SHA512

      ba395692661d023f74b9e6063f2b4ccf47309eddd36b357f5f6e490fa3179a12efdd91f9285d282f19bde8117b2527a1295a8478c243a2cb67ca414381cefc33

    • C:\Users\Admin\AppData\Roaming\OptimizeSend.doc.exe

      Filesize

      512KB

      MD5

      d84877c968362205d9eb56798b87d48c

      SHA1

      a9d2b84e6dd14d9aeb0b65a1b01dcb0b2833c27f

      SHA256

      947b13574c6cefb0430364dbddfba56ab5c5a32e1fb906b710f62f3e1b6e7528

      SHA512

      c8c26ffd6b7edec1269446d6a216cd3a9b70ee1992167f5f8e3498b1170db86a4918c1cf4c5da566f8b748f5dbb9fa13dfd0ba4cec1b752041da0ec8925e5789

    • C:\Users\Admin\Downloads\StartBackup.doc.exe

      Filesize

      512KB

      MD5

      309d7d4a54e9ce5165246e8ac6246837

      SHA1

      64f69d943fb051f78aebd7d7d891714a586202e9

      SHA256

      6200ad575c19d6e5d85df73fbb158f532ff7fce9003df2c23fcc3f95dd54f90a

      SHA512

      8c7073ee8a5751840c8868b2c6ef92c93c15cb0f01a96ae1bed62a844f4165c1e0bef221b68f1c1dd428a7249e0551453c4c873a916899bd8900c7f14f3be647

    • C:\Windows\SysWOW64\buzkibstegxxtix.exe

      Filesize

      512KB

      MD5

      c9163de88f10b0e290b441d078975bf5

      SHA1

      d3a010a6399b7c7fb07f0ee455c40017b723927b

      SHA256

      6705b3fedb6db49c5277c2598087dcb390f91a7beec1fa71f51409ba1e030c79

      SHA512

      903010df449e73d4257745e9af30c95ce3517fd04c8b01dd8059829399546d08bafb2c9f698a477e75fa01fb49ec09803878aaecddff930161fd56bb0872144e

    • C:\Windows\SysWOW64\bzsfnrzoodzet.exe

      Filesize

      512KB

      MD5

      70908c5cd61803d6c37474bf92ce11d5

      SHA1

      9e51b04d70f186def5068b761a6c5ba5082d8e4a

      SHA256

      f4d0a74be2c60820f716d5523066db49f8a3856a13048ec30f8d00c4700c55b5

      SHA512

      d731dcacc4b3729dc46527b1ed1c2869fde2af7529597b4db0aa3aed9b2a3523045b59bb85abf067f58219ee5414305e5fc0ea7ed67f11f4bd42d122ec9a9085

    • C:\Windows\SysWOW64\chsolqgd.exe

      Filesize

      512KB

      MD5

      8fb3451bf2090444b97fa506e1177e26

      SHA1

      172466a3daa63554d0c4e56801720cdbac8789bc

      SHA256

      b3159dbd0149cf399b7e5f3fd26ca58ae747bc6e16731f24e7d0e1b33447f22a

      SHA512

      c4179253360623338c917a317e657ad5b82d2fcacfa02b3eb0eee80029a8bd18608e2cb1f45a5f64acf95a5975f7550d064ca9d02bf7f51ea9f367ba3ebadf60

    • C:\Windows\SysWOW64\drqhikzqub.exe

      Filesize

      512KB

      MD5

      ed7f410ed38f097e42c999bacf8f6099

      SHA1

      8126ad683cbe59b2f1ae62dc6a6873de87b7dfb7

      SHA256

      f9b41bf0f4e3afccb434a538b7c0b9593746b5a2170a2b9ec7a9a87b621dd033

      SHA512

      10a92ddfe3b0bb050b1f6adf54ca0d93d6c175a493ef2c4940b43e31197e78ba9772d08ab5cc0790dceb0c4d76a49ee83df5fb844ed4107577c4c7a28746b81a

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

      Filesize

      512KB

      MD5

      e848ae8c5b7b5290257ae059d627a2da

      SHA1

      63202abfb66481ce0f47d9eb9087131b1fb4d82d

      SHA256

      da444207b9081344b45cf25e505a66c66c96947d7b480e65b827885c1921d556

      SHA512

      065a61f401d5bc160c03e8b0e4898f1efc8059c235139a3c08a3e5efbb50169a4cc1342cc6cfd2b3ed28694b8903f9efb4c824cf000e6979893b3de0d52033bc

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

      Filesize

      512KB

      MD5

      90b322a0b7be01b1d1b2648e09645fbe

      SHA1

      e5365e2891b75d114551db550b2c2d44004cb528

      SHA256

      c178b205d4f8792cd4f930d76d70660a8a2ef6826bdeb173cc069d200825feb3

      SHA512

      8839e16fc5e178604e32512d3116918750608c060d875721f755e0fd5c058cc22fc5c88227b0b5810b933a2e79c046036216e8a57544540e072c396735a8659f

    • memory/628-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/1112-41-0x00007FF9B5770000-0x00007FF9B5780000-memory.dmp

      Filesize

      64KB

    • memory/1112-40-0x00007FF9B5770000-0x00007FF9B5780000-memory.dmp

      Filesize

      64KB

    • memory/1112-38-0x00007FF9B5770000-0x00007FF9B5780000-memory.dmp

      Filesize

      64KB

    • memory/1112-39-0x00007FF9B5770000-0x00007FF9B5780000-memory.dmp

      Filesize

      64KB

    • memory/1112-37-0x00007FF9B5770000-0x00007FF9B5780000-memory.dmp

      Filesize

      64KB

    • memory/1112-42-0x00007FF9B35C0000-0x00007FF9B35D0000-memory.dmp

      Filesize

      64KB

    • memory/1112-43-0x00007FF9B35C0000-0x00007FF9B35D0000-memory.dmp

      Filesize

      64KB

    • memory/1112-128-0x00007FF9B5770000-0x00007FF9B5780000-memory.dmp

      Filesize

      64KB

    • memory/1112-130-0x00007FF9B5770000-0x00007FF9B5780000-memory.dmp

      Filesize

      64KB

    • memory/1112-129-0x00007FF9B5770000-0x00007FF9B5780000-memory.dmp

      Filesize

      64KB

    • memory/1112-127-0x00007FF9B5770000-0x00007FF9B5780000-memory.dmp

      Filesize

      64KB