Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/06/2024, 15:52

General

  • Target

    b453a3611e3e34166f90e0d8b07f3db3_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    b453a3611e3e34166f90e0d8b07f3db3

  • SHA1

    a89dafff7bdcd5d1b0a26326d4c62d2fa2715a77

  • SHA256

    753d25a1bad0f519f87116ad81b27d47ec7d180923b7b35849acbc7a888d5b5d

  • SHA512

    bdc7e26da3d40c32d74ec5ae3a7eda5bcedc48bfe2265d243a4e578087aa03cd3f4fa4e1948024f980f49c692031c9f5d0961a0951956fd01fd9473cf1d884e3

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6u:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5N

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b453a3611e3e34166f90e0d8b07f3db3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b453a3611e3e34166f90e0d8b07f3db3_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:844
    • C:\Windows\SysWOW64\prdtilevhv.exe
      prdtilevhv.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:652
      • C:\Windows\SysWOW64\jdmkdxsz.exe
        C:\Windows\system32\jdmkdxsz.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2084
    • C:\Windows\SysWOW64\zffrggiywzjirkw.exe
      zffrggiywzjirkw.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:488
    • C:\Windows\SysWOW64\jdmkdxsz.exe
      jdmkdxsz.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1568
    • C:\Windows\SysWOW64\sgouztaulkqac.exe
      sgouztaulkqac.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4636
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1336
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3956 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4052

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      fdafbe8232cce32d8faa45a1e1bf6826

      SHA1

      b236f9d51a6112a21753093aa3f048aa314742a7

      SHA256

      c6bedfddc1e265bacd3865df90defa87fce3b7e217b7aa8db457a0d717b7c3fb

      SHA512

      93ce6753528e3a2235301bd7be1eca4c23b2a0c70f36077014fc90bc4a825217a87c252366ede1b76ce5ff66563db7849c7b69a297e9e83e4d0598d9dc0012a5

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      239B

      MD5

      12b138a5a40ffb88d1850866bf2959cd

      SHA1

      57001ba2de61329118440de3e9f8a81074cb28a2

      SHA256

      9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

      SHA512

      9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      6c2916ad2451209d26aa6db4c80ab884

      SHA1

      2771a65a2722d79d5f7de9fb16f75422773979b5

      SHA256

      049a1a6250c0b98792412ba3e30ff0fa655aff2e41f56ceb90faaf04a871fd3a

      SHA512

      720fe61ccfe30b794233652f8621002c22e9370ebef68c7f89e8d597904e15a34b6f5d7429ad30834df94ad84f7a262a49687ef0be63a86b54f09aee9cff345e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      95f5f6d2db4c56c14beca9a890f9be0c

      SHA1

      925c396cc37ceafd4e29deb348bdbee1cddf4f58

      SHA256

      490a052c8608be53a1c34fed53f22e258d3841ce35672c512f6c8960c3891c97

      SHA512

      a4de6a0e3e796702bd2e5f5b9205cfb82fec633ea5365d2c9ca52c265301deaaff6a1f1a89771a31970849e6430ffd5b1bee906a91184f6ba5060d2860607651

    • C:\Users\Admin\Desktop\RedoSubmit.doc.exe

      Filesize

      512KB

      MD5

      d6719a63581ec8733de223a667c008b3

      SHA1

      f38770f15e9f1ca49d696349301e726bfc934d9a

      SHA256

      87c21f6affb2953fc98a2aa2eed3b23ee462411cc2e8c54f570e91a3afc4e549

      SHA512

      01103cdf3df2c4755907d4b4965154e51c1c857a739471550e92e3a666b73de02dbde47326c48c341b13e7b04aa85663671aac623d00f2290508cfa700667945

    • C:\Windows\SysWOW64\jdmkdxsz.exe

      Filesize

      512KB

      MD5

      48a79dc120ea5c336330fa826bba5907

      SHA1

      0adae7afde7cb563a8a59637f477f2ec05e9c76f

      SHA256

      d371df71c93c2abdf5811658a97fa7dcf14eaec80a6afd107f4ca4c30a67879b

      SHA512

      f23aa8f8df2547237d732c3c4aa630b9b0b55bbf3f3eca9fcc1f1d341c398cd4fd36eda19170dcdbdf24780f738c11bb455dbd6e408f429e29e51e97b32241fe

    • C:\Windows\SysWOW64\prdtilevhv.exe

      Filesize

      512KB

      MD5

      514d0bafce742c8f7e68bf8eb84fbe88

      SHA1

      431ad548e3fca7ba30b60193bf93a393999b6f69

      SHA256

      1d9ac16824f6571ed328e764506b56ffd98d6af09c286ad571827e94df7bf5f3

      SHA512

      d7653258725deac349e5c46584aef62ac70bcdf31b98fd03b36c5f7b174245372d7850e4fde49323eadf8d4621af69a2299244867bfc9d9d076a60631d786247

    • C:\Windows\SysWOW64\sgouztaulkqac.exe

      Filesize

      512KB

      MD5

      67b7bba5465a3996bd0d56f5568b0889

      SHA1

      52b2e7987a68d5523d57b7ecd5e318befc9ae90a

      SHA256

      66a54aaf90820eaaa1b3770f798dca503b6739e2f9847c8cae604ee745da4b13

      SHA512

      c0801de4f541df87756ae20ae358cc3240c300254deeb40356ed81080931bf0b78e5bffb8727812191b9a41e58754e00bd6fbdb338149f7b00d62878030e9771

    • C:\Windows\SysWOW64\zffrggiywzjirkw.exe

      Filesize

      512KB

      MD5

      a77f855ca85cdee9401d9bf071fbb7af

      SHA1

      7e2fb9a6b4e5bb1b2257cbeddd270a9ebaf1dfc0

      SHA256

      4193fca9d5a123d9a6ea7c0434ec9868f855d407f42b8272903578b764e4b22a

      SHA512

      e5936ce3482d7f2ceb8a9bb8c7bad54b353a66a7ed7ae815c60ae3150036e56926faf25d45431518c3d871f12f62c85928b803fff25ccd528fe7bb8046ec220d

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

      Filesize

      512KB

      MD5

      302aec4c172397287cc27b9045f352a0

      SHA1

      4ddb12650253f5fae8fb5f4aae49797c2365f48d

      SHA256

      c90d9fa00db4c7305b2420f8a872c6b2b7e74a4e99e27784d36eedde577a7915

      SHA512

      8b0e322ae4d6a488397a88d6453f2dd62434908414efc825765094a2b254841141972adafe51ffacca10cc3619374d694cc93c4e88e8b55d124378e3b94b4064

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

      Filesize

      512KB

      MD5

      216dd61b7976c5c1e8c2f0bbfb8f17ad

      SHA1

      3536cbb644a30d6abe124264f16a5de92c6f9ef1

      SHA256

      a95a69ef226a185a2b6e0f947fe84e466ae6c2a157452757bc658d94037636ed

      SHA512

      974fbe06375c986fc23a64d52d9b2699120732c70a578918cc93fbfbcfbda4959d941d668bf5116ced6a4775cac45e81aad3dc8692b3f7d612bf32e442b6db95

    • memory/844-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/1336-43-0x00007FFF82AD0000-0x00007FFF82AE0000-memory.dmp

      Filesize

      64KB

    • memory/1336-42-0x00007FFF82AD0000-0x00007FFF82AE0000-memory.dmp

      Filesize

      64KB

    • memory/1336-41-0x00007FFF84CF0000-0x00007FFF84D00000-memory.dmp

      Filesize

      64KB

    • memory/1336-40-0x00007FFF84CF0000-0x00007FFF84D00000-memory.dmp

      Filesize

      64KB

    • memory/1336-38-0x00007FFF84CF0000-0x00007FFF84D00000-memory.dmp

      Filesize

      64KB

    • memory/1336-39-0x00007FFF84CF0000-0x00007FFF84D00000-memory.dmp

      Filesize

      64KB

    • memory/1336-37-0x00007FFF84CF0000-0x00007FFF84D00000-memory.dmp

      Filesize

      64KB

    • memory/1336-122-0x00007FFF84CF0000-0x00007FFF84D00000-memory.dmp

      Filesize

      64KB

    • memory/1336-125-0x00007FFF84CF0000-0x00007FFF84D00000-memory.dmp

      Filesize

      64KB

    • memory/1336-124-0x00007FFF84CF0000-0x00007FFF84D00000-memory.dmp

      Filesize

      64KB

    • memory/1336-123-0x00007FFF84CF0000-0x00007FFF84D00000-memory.dmp

      Filesize

      64KB