Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/06/2024, 07:51

General

  • Target

    b77c8b39957fbd5ea7a975a087b023f4_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    b77c8b39957fbd5ea7a975a087b023f4

  • SHA1

    8c79340d37de7a470fceefdfb67c44cb02921c1e

  • SHA256

    a9bebb9e46144414c65aa8d75f557e983e20824570cf68aa3f74f3e98fdea859

  • SHA512

    254357c3a85a19cd23f3e1e88b87ead7386ac51a1d16334e1f6637167f31a8a537412f8fe73dddffcfe98d1f139fdceecfc988fca4bf0b4acf7a7fdf29d0acd0

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6L:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm50

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b77c8b39957fbd5ea7a975a087b023f4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b77c8b39957fbd5ea7a975a087b023f4_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Windows\SysWOW64\zeddrpedgb.exe
      zeddrpedgb.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3076
      • C:\Windows\SysWOW64\kpdiotua.exe
        C:\Windows\system32\kpdiotua.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:5040
    • C:\Windows\SysWOW64\fqjyucwglmyeyci.exe
      fqjyucwglmyeyci.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1088
    • C:\Windows\SysWOW64\kpdiotua.exe
      kpdiotua.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1644
    • C:\Windows\SysWOW64\zhgbjhhjpocnc.exe
      zhgbjhhjpocnc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:724
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    8a04a4a2b83534148f5edee2b0a7fee7

    SHA1

    41824fcde15a8658584fd95c3fa46ca86bb00501

    SHA256

    6bc94f8f7f7c4612c93e4168fe5621d040e44c9f9f0233042e04dcc51e747cfa

    SHA512

    f648d9a5076d7df4756f93e3739dbeba0876fd62a6c39aa0a7feb6bd5b09caf93cfdcb02f23351b19378a76302668a65f5ae57c5a54166badf343f6acfd8509e

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    57db9a47c3c30d534eb99a4f3dcb195b

    SHA1

    ce5a26adc58b6ac71db1af5b2e477021f044be79

    SHA256

    7199944da39956a4bc46e217d5793c7da128dc6fb8131d2b615e88aadebd19cc

    SHA512

    9a4aeb6bfd314443637053db12f6c8888650e3f72ab0afaeab20c932783953d5fc5c5bdcf1c00cf067579ee26c8ac2d51ee57ab64422bdd16ee2924324f93408

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    c0c5974bb3b01b3ff7b98ec7f54de44e

    SHA1

    a601ab848a4c6c14ea6e72af33560b882422c901

    SHA256

    afd44323779b22afb4057a347dedfd4853bb54da5e23422d9c601af2b3f92945

    SHA512

    57e8bd6d63609726292dd1c02252a27e56449f0849e34afb998d65250aaeb14ca028043df1ef590ca76873a750a4ab3acb203cd83d3e15f76c504e197084c89f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    e754797c1d7e815b217db0a0a4335979

    SHA1

    c7037628b062734c3b95ab24814e258986de49f8

    SHA256

    417b0e00ad59ed086b6a13f4dfbcc9739271e47789397b8bd9612561fe6db5da

    SHA512

    2de8372179f0bc2ca04dd15ff6ba01d6252fe86a7bd20585b405c3949f0ec03f51ab936eaf8892b3608a723cbd61674125274e416cc03319c98dd023d3c01c79

  • C:\Users\Admin\Downloads\RestartRename.doc.exe

    Filesize

    512KB

    MD5

    2ab41e172969867d4a792546dcc7e6ff

    SHA1

    9df2988b99b6a228e96377e303715d348cc550ac

    SHA256

    f9cb12e4e5a8ea68668c285145b62618f92ccc105922701a62667cec1ab3d453

    SHA512

    7c03cd8b54036148ec8ccd358e7150bce3f03d7ea44b70c9695061b2fbf4106414841d86f7ce2aad19349195d71e2b8b86733526e2a22070401305293871e022

  • C:\Windows\SysWOW64\fqjyucwglmyeyci.exe

    Filesize

    512KB

    MD5

    ce7fc93e0118deae4ed7be5727cb2ca5

    SHA1

    4e490c80e94419a13b5a97e19064ca02db02733f

    SHA256

    dc6b8da21b84c39b6a4af24755d8791fd3ba47c035741bfb532de8b262a9a954

    SHA512

    a5c90302665717c401dd591472812ceed203a40f26d8488a34ebd92bb65e830891cb325260ce62c180ea83caa0f8e98efd096dc37db53411b62ade84cba44bc2

  • C:\Windows\SysWOW64\kpdiotua.exe

    Filesize

    512KB

    MD5

    7e2111bae5dac74b5df7b40761835d06

    SHA1

    f5ace8510bd10d46678f7db63ed04353c46c96bc

    SHA256

    fa7863202549159b295f3a8a51f82311a5546072f331b2cc8d9cd75305bc18f6

    SHA512

    155b9556e4578ca4b1a50421c77fbdcbc76b305f4812e032bb76aa481383f48c11883b1ec9fc93863bae3f5c3bcff1ba15c63c7125e7148637c0baeb2fde6329

  • C:\Windows\SysWOW64\zeddrpedgb.exe

    Filesize

    512KB

    MD5

    b08d84530516c392d1427202609b2096

    SHA1

    28cd2b13feae19f835c65e58f0e0b6ba45de299e

    SHA256

    7e8a791a54a09e87e3af89a3b08b7770c2a81aded998873611cbab73981e3e7e

    SHA512

    df1e5bc2e93c94dfd3d6957425246d00d00ed4e11e35fa62e591abe997bd912f8bc9d25b19c679eee2a07e226464c2640a447136776b960483c8b4b8ac3c98b6

  • C:\Windows\SysWOW64\zhgbjhhjpocnc.exe

    Filesize

    512KB

    MD5

    e3f392b9f6038bd0d28f601a92b640ab

    SHA1

    eab9f7b6f983f9dfabe2593acf7495808924de2f

    SHA256

    162ae1d08335f3483e06179085731c8e82b19dbc661be9168ca2b9be4a201978

    SHA512

    7e9835b5ff9c1c8b4a5bf15548ca196b9af936e699bd3845e663cde5bf2eae704978ce8290893347d1ff5b316f966e4f82b08e0d5594fc9fd24b89e153417455

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    2c1cc7d25a24e5bb770172958c1355a1

    SHA1

    777e257ab6570548ad25dbf0881c2aa0fd2fafd4

    SHA256

    e0b9725ac248d6ae264f6389c346f32d8ca41459f0e6105a7d7bf113b326f0b9

    SHA512

    e026f6b24e271b272c25163286433ec1a7ae259cf99cefe191445e29f119823f9ebba1bd9fa67bac768d06a91dfc151dfa36dc54d24a8f9acec0f8f2049090d4

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    95581deb80411bed643796d2bcc6c412

    SHA1

    5672946e9ec29287737213c02f60c1586d40c8fe

    SHA256

    1ac21b1b998a7287d9baf7fb253b88c99f439b58b7e9342d895a2a9eeac02264

    SHA512

    f44ff3e8cf8e29b563d020a4b65bf6566ccc486b8e9a04494d5797616884905d270a894fdd11b35dcecb169e11d08cafdd2b74a94395974638ca54cab058a656

  • memory/2764-40-0x00007FF7DCEE0000-0x00007FF7DCEF0000-memory.dmp

    Filesize

    64KB

  • memory/2764-36-0x00007FF7DF0D0000-0x00007FF7DF0E0000-memory.dmp

    Filesize

    64KB

  • memory/2764-39-0x00007FF7DF0D0000-0x00007FF7DF0E0000-memory.dmp

    Filesize

    64KB

  • memory/2764-37-0x00007FF7DF0D0000-0x00007FF7DF0E0000-memory.dmp

    Filesize

    64KB

  • memory/2764-38-0x00007FF7DF0D0000-0x00007FF7DF0E0000-memory.dmp

    Filesize

    64KB

  • memory/2764-35-0x00007FF7DF0D0000-0x00007FF7DF0E0000-memory.dmp

    Filesize

    64KB

  • memory/2764-41-0x00007FF7DCEE0000-0x00007FF7DCEF0000-memory.dmp

    Filesize

    64KB

  • memory/2764-117-0x00007FF7DF0D0000-0x00007FF7DF0E0000-memory.dmp

    Filesize

    64KB

  • memory/2764-118-0x00007FF7DF0D0000-0x00007FF7DF0E0000-memory.dmp

    Filesize

    64KB

  • memory/2764-119-0x00007FF7DF0D0000-0x00007FF7DF0E0000-memory.dmp

    Filesize

    64KB

  • memory/2764-116-0x00007FF7DF0D0000-0x00007FF7DF0E0000-memory.dmp

    Filesize

    64KB

  • memory/4152-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB