Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 22:44

General

  • Target

    d538e33e460f736d6748f866ee31fdc6_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    d538e33e460f736d6748f866ee31fdc6

  • SHA1

    2b5cf80c58d6bc905c11f9374ecc64f962aa5b6a

  • SHA256

    7fd5992c88194526a13050960d694f1b637d8a87b9d845e9a4b0d3c47560174b

  • SHA512

    7ca6d93548f247d0cf08cca98b1dbcabfd93ecddb5dcd33ac631ae296ab03f6711a01f46800e32650321686d798210b2026ff45023424cfc369b25e84114711f

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6A:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5B

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d538e33e460f736d6748f866ee31fdc6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d538e33e460f736d6748f866ee31fdc6_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:696
    • C:\Windows\SysWOW64\zxqwhahbhl.exe
      zxqwhahbhl.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Windows\SysWOW64\wpisxwhg.exe
        C:\Windows\system32\wpisxwhg.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4392
    • C:\Windows\SysWOW64\cehfxylrxncqdzb.exe
      cehfxylrxncqdzb.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4536
    • C:\Windows\SysWOW64\wpisxwhg.exe
      wpisxwhg.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1308
    • C:\Windows\SysWOW64\ohdrsosgadjrs.exe
      ohdrsosgadjrs.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4812
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    eb88729f34dca1e87af9e5450e3dd332

    SHA1

    a175191cc634c57239071090dd51c1277ad10f42

    SHA256

    22e0a2d1fa8800eab34eb1743814e30dd7654065e2a4d0a2826298f12c9b77da

    SHA512

    c5fcd21fb1d1f2593df09354b1b39ada91f542fb176446943274bce6f0da4f47af0fdc4f52dc6270dccfdde536435d97490ae908e523746ea8ab48cb4f9b0e41

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    53bfed680f65372fb1ea70177a1b8633

    SHA1

    989dae3885619f2e27ed2110641b3480741ec8e1

    SHA256

    694087600d045773f454f75519f3d290f23c6e617f63809a632a5a8072e6ef0a

    SHA512

    f9304d2a76b3cde7c0d6fdc84113a25ea6ee20912fa310aa9c199bf5f402e5b057e8b2379bc964eee1fddc0f170202ea29a878cd3c10ff2d6973fb8367eb1f0f

  • C:\Users\Admin\AppData\Local\Temp\TCDD513.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    315B

    MD5

    492a0170d9361b1cc3391368ddd51387

    SHA1

    1731098c2fed7b0e22c7e8d2083419ee4012e312

    SHA256

    da1e115b93bdd1a40c9be25e48872d267a7ef4080ca80c877bf236239faeab8b

    SHA512

    17a1544b502081438caa81bf60e05d985c8495d1bbe572ac70aedf8c19a9e12adab420d704d9dd6cfffa0ee0bf030af81e1e88560748526b09df8e9452aff0fe

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    16B

    MD5

    d29962abc88624befc0135579ae485ec

    SHA1

    e40a6458296ec6a2427bcb280572d023a9862b31

    SHA256

    a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

    SHA512

    4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    c5abdd2376733a86e370a42e34cff74d

    SHA1

    c1a95e5b4d131afa1237840dcdf1a344ac8de05d

    SHA256

    3a648a69f352646146c9279d96f2a77e342ad9b6256bf20fa0c59096873bd207

    SHA512

    6cb6d390354446f5b16c388073a0456aac8f30eb11df0475427461a2719e5068e747035b339194c43f57d872cecc3ae45e8499894f9ee30ad621b1955521b45d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    2KB

    MD5

    504522f50a80d5a092d8201ddd274469

    SHA1

    e0687aa71624ddb3e0cf8132954c2a30e4bd157e

    SHA256

    30cb9e2213f7b0b32835208c62f0ace4c133ed7dd832cf21ef7f8b0d519e8ba7

    SHA512

    a7ea046f33088b9a66e6cdfa89bcce5ffcb4fd44051de5a7b8dcc46e2d10c10e971d58924035cbd39f433b07adc8619d20695a7014e583330d41e17997cc4bbd

  • C:\Users\Admin\Documents\RestartUnblock.doc.exe

    Filesize

    512KB

    MD5

    3b7e18da28b19a0c98cd32cabea268dd

    SHA1

    9cddf8d42a2b980a878898e94d31a3e2893b5e7a

    SHA256

    da73117c0c9542d6e86683c2469b40941a39707c879b6c3714141c5535736938

    SHA512

    15087568d3ee8caf0d577c5cb693b3a67357e8f504701b6cbd9bd54d1d7b605ef99d0c83e3b6e16f36d903aabf11c88b6df3b9e1f73242ba37031dbb58b7f14d

  • C:\Windows\SysWOW64\cehfxylrxncqdzb.exe

    Filesize

    512KB

    MD5

    ea493ce7ab77a01d0a602dbfe54e98ac

    SHA1

    2dc0459ec67d2f66e7d6717ba16abcbb3e19a2cf

    SHA256

    8bd93ed97dbc3ee1f51a9ba7fe3d36b514a955d76205717d39ba6cb3f82b4612

    SHA512

    a04f2300af3cd33cc96d975c71a673bd559a73e60bd892851be3fe1d89093e4586063a5e3757d2de2c5445cc374b1a8d290dce1af6d7994ff62bf3b9448a7abb

  • C:\Windows\SysWOW64\ohdrsosgadjrs.exe

    Filesize

    512KB

    MD5

    cda387bbf22dc926ee9ad671958b41bf

    SHA1

    efa385c5f6458e876fa36887cfd5526a3598f4ba

    SHA256

    6f6762971fb2232a04cec3d5186bd9a95490020034310a32212514cb115db1ca

    SHA512

    d66fca46cc41aca4a7037bbbb2cb5fe4792f88996147a7e9f77fdfd74fecb91073e4456495bfe1fe5ff9744d5573dc44d3c5434dbca606ae9b0c64fc22d51d8c

  • C:\Windows\SysWOW64\wpisxwhg.exe

    Filesize

    512KB

    MD5

    cf1fe28f1f513ab1784ca3e7a7d8ad8e

    SHA1

    b53e4cf0c528c9edd2cf8bf39ff925600aee3d18

    SHA256

    11b75e872eff3e20aef7e17f27826b79dac6f3ec061ed69927d8ee47548fffba

    SHA512

    b75ecdc94ea26134af71eeb04346c67b1aa0bc97a7da6b3617ab2de66847c1177745a160f4b6d0662a709bdcb1f5cfce82c257810e3de5a286f491b9e2022595

  • C:\Windows\SysWOW64\zxqwhahbhl.exe

    Filesize

    512KB

    MD5

    8d2c75977f5b86712cd966f4b6710209

    SHA1

    b742c49ba2b3d9a21701f5debce95e46a75f19b7

    SHA256

    a4462799c1cc1f95332505d5861a1103ea068866ab53be3682afff72da79e9bf

    SHA512

    7d071353439d5f93409014ae2264b9755c1a56fe6e581de217cd7b0d63867193c081a5fb0475070e20d651bc397045a68df20ee6420cad5d6c8de2578770a5d2

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    a033ead5ba547d79cb20356bcfdf228a

    SHA1

    d43c89ed4ef11ea58bca4f812faa70c911e71d77

    SHA256

    c675b65aec8a6d4abf066f7c733ccda8972060ff555dceb331af074d533ed5ec

    SHA512

    b6506350cc2b66c0d0375d5a4f7b163ae6cff98b4d9608510dcce6bb4646dd65e998c9380fbd54e70e17b6b6c4bb478a7b1a1bb06c853e99819fc293320285fe

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    1d16d1387ff01db940891a76656a89dc

    SHA1

    e66aff49fcd6b17198cbc4138c33860ccb0d9382

    SHA256

    729dea69006f986adf63246321552439b669bdeee34a5624810458b974f0ce46

    SHA512

    45677fe22dc055213251ada045636453d35fb336061498d97e822c87960d55245206011e5c581aecc96f380cf709f72a3af459a2e7abc3913dfb124a4e1d58fd

  • memory/696-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/724-39-0x00007FFEB2110000-0x00007FFEB2120000-memory.dmp

    Filesize

    64KB

  • memory/724-38-0x00007FFEB2110000-0x00007FFEB2120000-memory.dmp

    Filesize

    64KB

  • memory/724-36-0x00007FFEB2110000-0x00007FFEB2120000-memory.dmp

    Filesize

    64KB

  • memory/724-37-0x00007FFEB2110000-0x00007FFEB2120000-memory.dmp

    Filesize

    64KB

  • memory/724-40-0x00007FFEAFCD0000-0x00007FFEAFCE0000-memory.dmp

    Filesize

    64KB

  • memory/724-35-0x00007FFEB2110000-0x00007FFEB2120000-memory.dmp

    Filesize

    64KB

  • memory/724-41-0x00007FFEAFCD0000-0x00007FFEAFCE0000-memory.dmp

    Filesize

    64KB

  • memory/724-527-0x00007FFEB2110000-0x00007FFEB2120000-memory.dmp

    Filesize

    64KB

  • memory/724-526-0x00007FFEB2110000-0x00007FFEB2120000-memory.dmp

    Filesize

    64KB

  • memory/724-525-0x00007FFEB2110000-0x00007FFEB2120000-memory.dmp

    Filesize

    64KB

  • memory/724-524-0x00007FFEB2110000-0x00007FFEB2120000-memory.dmp

    Filesize

    64KB