Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 15:49

General

  • Target

    c11192dc6211e591dca1454c40404a7d_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    c11192dc6211e591dca1454c40404a7d

  • SHA1

    809c6aa8d2232d7bd79e82af9c6344ed093a8527

  • SHA256

    f2967282fa56e471a8df2ec0fda6d88b4fb44db6833d8952050c8bf72511b7e6

  • SHA512

    b59214b9b4b0453ae7ce5b7d67a021fb0804f8da20d903b85813d9ed6075a5d14b2b9b0bcb483ea81caa737dd57607524e8917c25eb58151b9ccc5be48e3cbee

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj65:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5S

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 19 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c11192dc6211e591dca1454c40404a7d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c11192dc6211e591dca1454c40404a7d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Windows\SysWOW64\vvhhgsgyzc.exe
      vvhhgsgyzc.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Windows\SysWOW64\lvexkazu.exe
        C:\Windows\system32\lvexkazu.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2892
    • C:\Windows\SysWOW64\jhcdthpnbjsrjtf.exe
      jhcdthpnbjsrjtf.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2576
    • C:\Windows\SysWOW64\lvexkazu.exe
      lvexkazu.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1608
    • C:\Windows\SysWOW64\gairbmoykoebi.exe
      gairbmoykoebi.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2796
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2960

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      8935f48890f91e24ea47e9c689606b14

      SHA1

      dc1a8c97e0cb9883c52e0cc0ebd576c952397889

      SHA256

      7a6d4fc48d9454eb1e4538e23c90e816b5a29942bd26697d8fb3498ec6e258b6

      SHA512

      a319d694aa3f71fc8fd7276ebeee88c3be4ff3ed07ffdbe5b832ed5ca2e693a4e32162afba13cca9d254b8535ae4d867f84f90c5ca78b9185f9b6e3b1bbf05c9

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      04f1d0c1a6ba73b9a768eb31d2e90050

      SHA1

      afb94a682eb890ecff9615d7f8b0a27e4f15b233

      SHA256

      17e1c5b4b4fcb89f79585aa2a960013b283b0894bdcdcc546c66087f707caf94

      SHA512

      ef008f8533dbd259724dc918715a93af72acd22f10bf75fa741cdbc45cca7dfbd344a196f8488fc8391802f9047cae18ddeaf8068b6e7486b5e34f09976269d5

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      262f1844215092f2a8d777e0f28377e3

      SHA1

      36c9d4c9c2c384b1df369fa7424f6251e6497062

      SHA256

      32f73cca6f4ece0f37ec102409b3931fcee07e3cc5abb615f903a768799f3b99

      SHA512

      a373143686968d9cb7773937cb6b6eaaf4a812dee0c9ccc2add9c6681a542673d47f5e718c805b8f7efc73386511884fc47eaddb97c93c965edfe69f4662d25d

    • C:\Windows\SysWOW64\lvexkazu.exe

      Filesize

      512KB

      MD5

      c4c5cfac7a2a28809da7ce63c066aba8

      SHA1

      caa0ea13a886206718342fb41130a9590aaa46fb

      SHA256

      ffce63f3e6c053cdd5047346043e3e3a498d66a83e288cabd01aa293a1c3a733

      SHA512

      268bd4f18541f8e3a27dfe83375b1f3ccd3763a704909c2ea223f5450a94b36d920a7701fe862e13ad5f192b1b7fc3b03271df2022348ff6927942077f4ec3f7

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\gairbmoykoebi.exe

      Filesize

      512KB

      MD5

      5886d993bd3fae05395560d36c1b09dd

      SHA1

      1f79a8b9f4945c5fa1f65206ff27a6884088cdfa

      SHA256

      18a18765562c53a68ad4f3d9b5c1cf6f259ee46a6335ad825f998647fc04385a

      SHA512

      27e4e3e90203bfbabdbb1249efbf55145aac4c71f121de7b55b6c49f58ea61242fe3a853cc69a437496e33208089e9999502c68a84fb8635e4f134288c6b33aa

    • \Windows\SysWOW64\jhcdthpnbjsrjtf.exe

      Filesize

      512KB

      MD5

      67a098a49d82152cd2623632371ca7b7

      SHA1

      2c64cf8b8b60dd63e06786f81a7ea7976899d8da

      SHA256

      05fce3c7184077881bdadbc1a67a803fed5c220dc1385792ffa48fd013323449

      SHA512

      1ac8cdf00cbe1746c996dc0852992ed65baa8f224ae1b4bd5c0f029e3daa99da0a1724d2b079895439e9ac68ae43bb9f53d49cb0e45abe501cfb26face76907f

    • \Windows\SysWOW64\vvhhgsgyzc.exe

      Filesize

      512KB

      MD5

      c00be9890f4c46fe706bbf648b84216f

      SHA1

      019d27285255383b948bc2f092c4e7cb0b739294

      SHA256

      3bdfa69e59f9ce3b0791c84b4a80e1b21ddd9da30519579820dbd086e299ef68

      SHA512

      15b2c92057e599ef8cb2cbcd9c49d47f623833cdbd29e6e88b990816d81a5baabd7325250b345f1a3a4c832c97e43e4cc3c80b44dc18fa66e94f79233c1e5a81

    • memory/2644-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2644-97-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2928-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB