Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 01:58
Static task
static1
Behavioral task
behavioral1
Sample
d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe
-
Size
512KB
-
MD5
d3480587506aa97cf6e06b8043ed83e4
-
SHA1
96cbc8819d5c747943caadebdac01433707c445e
-
SHA256
1d1e89d2b70fe9e6759e636e1bbb71c282180f9f7e9946fc1e61b2b35c43c762
-
SHA512
624505b9b315d3ad80ba5e3848fccf0a1ee0d5152f7bdca00a65ccb376db0e83eedbdd619b27d8df13d37e1662776a1fe58bb8aee3a3848d9a0afb475618a7c2
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6c:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5v
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" goirhprykg.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" goirhprykg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" goirhprykg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" goirhprykg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" goirhprykg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" goirhprykg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" goirhprykg.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" goirhprykg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
pid Process 3604 goirhprykg.exe 852 gxhtglidohsyzby.exe 2432 pbrholuq.exe 640 zqsinpawvtwpo.exe 752 pbrholuq.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" goirhprykg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" goirhprykg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" goirhprykg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" goirhprykg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" goirhprykg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" goirhprykg.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dygekbiv = "goirhprykg.exe" gxhtglidohsyzby.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wvknyfei = "gxhtglidohsyzby.exe" gxhtglidohsyzby.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "zqsinpawvtwpo.exe" gxhtglidohsyzby.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\h: goirhprykg.exe File opened (read-only) \??\j: goirhprykg.exe File opened (read-only) \??\l: goirhprykg.exe File opened (read-only) \??\g: pbrholuq.exe File opened (read-only) \??\p: pbrholuq.exe File opened (read-only) \??\q: pbrholuq.exe File opened (read-only) \??\t: pbrholuq.exe File opened (read-only) \??\m: pbrholuq.exe File opened (read-only) \??\t: pbrholuq.exe File opened (read-only) \??\u: pbrholuq.exe File opened (read-only) \??\s: goirhprykg.exe File opened (read-only) \??\u: goirhprykg.exe File opened (read-only) \??\b: goirhprykg.exe File opened (read-only) \??\m: goirhprykg.exe File opened (read-only) \??\o: goirhprykg.exe File opened (read-only) \??\q: goirhprykg.exe File opened (read-only) \??\x: goirhprykg.exe File opened (read-only) \??\z: goirhprykg.exe File opened (read-only) \??\b: pbrholuq.exe File opened (read-only) \??\i: pbrholuq.exe File opened (read-only) \??\x: pbrholuq.exe File opened (read-only) \??\a: goirhprykg.exe File opened (read-only) \??\v: goirhprykg.exe File opened (read-only) \??\u: pbrholuq.exe File opened (read-only) \??\h: pbrholuq.exe File opened (read-only) \??\j: pbrholuq.exe File opened (read-only) \??\e: goirhprykg.exe File opened (read-only) \??\m: pbrholuq.exe File opened (read-only) \??\n: pbrholuq.exe File opened (read-only) \??\g: pbrholuq.exe File opened (read-only) \??\z: pbrholuq.exe File opened (read-only) \??\g: goirhprykg.exe File opened (read-only) \??\e: pbrholuq.exe File opened (read-only) \??\v: pbrholuq.exe File opened (read-only) \??\y: pbrholuq.exe File opened (read-only) \??\r: goirhprykg.exe File opened (read-only) \??\t: goirhprykg.exe File opened (read-only) \??\e: pbrholuq.exe File opened (read-only) \??\h: pbrholuq.exe File opened (read-only) \??\l: pbrholuq.exe File opened (read-only) \??\k: pbrholuq.exe File opened (read-only) \??\q: pbrholuq.exe File opened (read-only) \??\w: pbrholuq.exe File opened (read-only) \??\l: pbrholuq.exe File opened (read-only) \??\p: pbrholuq.exe File opened (read-only) \??\s: pbrholuq.exe File opened (read-only) \??\n: goirhprykg.exe File opened (read-only) \??\y: goirhprykg.exe File opened (read-only) \??\b: pbrholuq.exe File opened (read-only) \??\y: pbrholuq.exe File opened (read-only) \??\i: goirhprykg.exe File opened (read-only) \??\a: pbrholuq.exe File opened (read-only) \??\i: pbrholuq.exe File opened (read-only) \??\v: pbrholuq.exe File opened (read-only) \??\o: pbrholuq.exe File opened (read-only) \??\r: pbrholuq.exe File opened (read-only) \??\x: pbrholuq.exe File opened (read-only) \??\k: goirhprykg.exe File opened (read-only) \??\n: pbrholuq.exe File opened (read-only) \??\o: pbrholuq.exe File opened (read-only) \??\z: pbrholuq.exe File opened (read-only) \??\a: pbrholuq.exe File opened (read-only) \??\r: pbrholuq.exe File opened (read-only) \??\w: pbrholuq.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" goirhprykg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" goirhprykg.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3424-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x0008000000023427-5.dat autoit_exe behavioral2/files/0x00090000000233c8-18.dat autoit_exe behavioral2/files/0x000700000002342b-24.dat autoit_exe behavioral2/files/0x000700000002342c-32.dat autoit_exe behavioral2/files/0x0007000000023437-62.dat autoit_exe behavioral2/files/0x0008000000009da0-88.dat autoit_exe behavioral2/files/0x0008000000023442-106.dat autoit_exe behavioral2/files/0x0008000000023442-108.dat autoit_exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\zqsinpawvtwpo.exe d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe pbrholuq.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe pbrholuq.exe File created C:\Windows\SysWOW64\goirhprykg.exe d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe File created C:\Windows\SysWOW64\gxhtglidohsyzby.exe d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\gxhtglidohsyzby.exe d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe File created C:\Windows\SysWOW64\pbrholuq.exe d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\pbrholuq.exe d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\goirhprykg.exe d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\zqsinpawvtwpo.exe d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll goirhprykg.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe pbrholuq.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pbrholuq.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pbrholuq.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pbrholuq.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pbrholuq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal pbrholuq.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pbrholuq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal pbrholuq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pbrholuq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal pbrholuq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal pbrholuq.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pbrholuq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pbrholuq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pbrholuq.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pbrholuq.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe pbrholuq.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe pbrholuq.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe pbrholuq.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe pbrholuq.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe pbrholuq.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe pbrholuq.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe pbrholuq.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe pbrholuq.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe pbrholuq.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe pbrholuq.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe pbrholuq.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe pbrholuq.exe File opened for modification C:\Windows\mydoc.rtf d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe pbrholuq.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe pbrholuq.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe pbrholuq.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe pbrholuq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pbrholuq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zqsinpawvtwpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pbrholuq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language goirhprykg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gxhtglidohsyzby.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6AC9F9BCF965F2E2830C3B3686EB3995B08002FC4212024BE2C4429B09A3" d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2ECBB128449739EA53B8BAA533E9D4BC" d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat goirhprykg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc goirhprykg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg goirhprykg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" goirhprykg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" goirhprykg.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FFBFCF94F5A85189136D65C7D94BC95E63458436640623ED79B" d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F568C3FE1A21DDD27BD0D38A099017" d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" goirhprykg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" goirhprykg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "193EC70C1596DAB5B9CD7CE2EDE234B9" d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh goirhprykg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf goirhprykg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33442C779C2082226A3477D077242DD77D8564DE" d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" goirhprykg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs goirhprykg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" goirhprykg.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1064 WINWORD.EXE 1064 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 2432 pbrholuq.exe 2432 pbrholuq.exe 2432 pbrholuq.exe 2432 pbrholuq.exe 2432 pbrholuq.exe 2432 pbrholuq.exe 2432 pbrholuq.exe 2432 pbrholuq.exe 852 gxhtglidohsyzby.exe 852 gxhtglidohsyzby.exe 852 gxhtglidohsyzby.exe 852 gxhtglidohsyzby.exe 852 gxhtglidohsyzby.exe 852 gxhtglidohsyzby.exe 852 gxhtglidohsyzby.exe 852 gxhtglidohsyzby.exe 852 gxhtglidohsyzby.exe 852 gxhtglidohsyzby.exe 3604 goirhprykg.exe 3604 goirhprykg.exe 3604 goirhprykg.exe 3604 goirhprykg.exe 3604 goirhprykg.exe 3604 goirhprykg.exe 3604 goirhprykg.exe 3604 goirhprykg.exe 3604 goirhprykg.exe 3604 goirhprykg.exe 640 zqsinpawvtwpo.exe 640 zqsinpawvtwpo.exe 640 zqsinpawvtwpo.exe 640 zqsinpawvtwpo.exe 640 zqsinpawvtwpo.exe 640 zqsinpawvtwpo.exe 640 zqsinpawvtwpo.exe 640 zqsinpawvtwpo.exe 640 zqsinpawvtwpo.exe 640 zqsinpawvtwpo.exe 640 zqsinpawvtwpo.exe 640 zqsinpawvtwpo.exe 852 gxhtglidohsyzby.exe 852 gxhtglidohsyzby.exe 752 pbrholuq.exe 752 pbrholuq.exe 752 pbrholuq.exe 752 pbrholuq.exe 752 pbrholuq.exe 752 pbrholuq.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 2432 pbrholuq.exe 852 gxhtglidohsyzby.exe 2432 pbrholuq.exe 852 gxhtglidohsyzby.exe 852 gxhtglidohsyzby.exe 2432 pbrholuq.exe 3604 goirhprykg.exe 3604 goirhprykg.exe 3604 goirhprykg.exe 640 zqsinpawvtwpo.exe 640 zqsinpawvtwpo.exe 640 zqsinpawvtwpo.exe 752 pbrholuq.exe 752 pbrholuq.exe 752 pbrholuq.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 2432 pbrholuq.exe 852 gxhtglidohsyzby.exe 2432 pbrholuq.exe 852 gxhtglidohsyzby.exe 852 gxhtglidohsyzby.exe 2432 pbrholuq.exe 3604 goirhprykg.exe 3604 goirhprykg.exe 3604 goirhprykg.exe 640 zqsinpawvtwpo.exe 640 zqsinpawvtwpo.exe 640 zqsinpawvtwpo.exe 752 pbrholuq.exe 752 pbrholuq.exe 752 pbrholuq.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1064 WINWORD.EXE 1064 WINWORD.EXE 1064 WINWORD.EXE 1064 WINWORD.EXE 1064 WINWORD.EXE 1064 WINWORD.EXE 1064 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3424 wrote to memory of 3604 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 84 PID 3424 wrote to memory of 3604 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 84 PID 3424 wrote to memory of 3604 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 84 PID 3424 wrote to memory of 852 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 85 PID 3424 wrote to memory of 852 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 85 PID 3424 wrote to memory of 852 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 85 PID 3424 wrote to memory of 2432 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 86 PID 3424 wrote to memory of 2432 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 86 PID 3424 wrote to memory of 2432 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 86 PID 3424 wrote to memory of 640 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 87 PID 3424 wrote to memory of 640 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 87 PID 3424 wrote to memory of 640 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 87 PID 3424 wrote to memory of 1064 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 88 PID 3424 wrote to memory of 1064 3424 d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe 88 PID 3604 wrote to memory of 752 3604 goirhprykg.exe 90 PID 3604 wrote to memory of 752 3604 goirhprykg.exe 90 PID 3604 wrote to memory of 752 3604 goirhprykg.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\goirhprykg.exegoirhprykg.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\pbrholuq.exeC:\Windows\system32\pbrholuq.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:752
-
-
-
C:\Windows\SysWOW64\gxhtglidohsyzby.exegxhtglidohsyzby.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:852
-
-
C:\Windows\SysWOW64\pbrholuq.exepbrholuq.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2432
-
-
C:\Windows\SysWOW64\zqsinpawvtwpo.exezqsinpawvtwpo.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:640
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1064
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD56c6dfa011d80ac94d9e7e64b61515e0e
SHA1f5de8a61e51a2686f9c5d39aafecd95c8aa876d9
SHA256e4366fc49a1a09e47b67886df3c7895e21296765c18545e4d654cfffe142f26c
SHA512c3d3624678e71dd8a6691450b8cefa78fd61e1b70a16088419552f955423e2a85acdba21a87284188c743f45917b0037a67f345ad6fcd2f9967a6486d78fff09
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
346B
MD5baf8ae4bdea77a791dc8d731b255db17
SHA1db273c7892f5c00a2f1927184fc79cc9d7443b09
SHA2560ac778f626874fa5c4cbcc36468acdb9cfabca2605b96f64bf90b3334b2e5ca5
SHA5128e1b338653012216586aaae2e40fe8a94e58d131361bb70a73792b7b7471a4aab33d15daef474ee80e52aa9cca726e0890d9ebe0e113fd4e4373e5f2a605c060
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD5918f52e1fc432eb6d0cb6ab0537de38f
SHA1ea81ed5e5eabdb7ccc05f5c4e1b7d6521112890f
SHA256b23d184faa1fa3d73da304dad8f57fcb241de25fc3bc6abd48903d71d189bf7d
SHA512678c6d80d53b97097b1218caf0b539c552daad5c40b1ae1f614438dfb493c0f1aaaa03b85d66bcaf6c2b3c6ee9d8ef6385589a2aada54ae854cf5c874ad7886c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize2KB
MD5869819faa1dcfbb0d8bfd2f30111e6ab
SHA15c1f820a3e36a4531783821a1f0b91142670ee77
SHA256e1937b38964469c1dc9377a6374dcad1fbf26cefaa2a3be0eda03d102d645d70
SHA5128fc4f147d1d550163b45856aef887ff43f8e4382594b3e4505eb32cc0e0257c4d57fcc04e157e745a1d2bbec665a092bc470cb68b30186874bad623b232b3b53
-
Filesize
512KB
MD5dae870a3c22af0a7ab214fde89f14f56
SHA1c802bddf301a228d1eed2f333001cacfa9530ff8
SHA25654a5861b9076f1346229c95f96bbc0ef22993be490eae732f2a215ed029640da
SHA5128d7035d604a0db4a05e6ed9d7562df83d5fefba424c0d48cfb5ecf2f0905f626963c6ca94c89f43ccd5d388b8fd6380bf54de5cb0234a61d73ec7b311c5b877b
-
Filesize
512KB
MD52fc9184375d11d88049b4f6be94c3450
SHA1d3626e87310115d9add7a697560272b85e0eb9ff
SHA2567cb0696ead42aacf616573d15f5b24170f7cbcd67ab90f3c5d5dcda3a2af248f
SHA512e5cd1b941266848015c03796b01045f4cfe33447377c1c8416ed952d2d921ebca21fee055d0c28b41c7cda7a8d69354c1beb913fadc2847b59b7c3e9fac92bba
-
Filesize
512KB
MD53fcc140e33657bf3dedeef9184b9abf0
SHA1f6ea5a9bad501da0e535bc53b22089a55411d603
SHA25676794885782eaedab96fb7be01b45418a8689e19fee76ce97d5f39e3bec017b9
SHA5123fe6c4448a4bacabb60eb4fb9de8592d19045b478baf8c7744595e9a1ad83f7e2ffae9a31b32a147c5bc0f095178c16d0636b0e3bdc85d0f3009c611e32bf470
-
Filesize
512KB
MD527d487e5351a04674c76adfd8a400643
SHA16fbce6b83b692c93845c1606f313b0c5603b0112
SHA256e3c3e16e4f9030b3050726d4add1814fc7d743e9d840e237f7b3f630a26fe74e
SHA5125147f4bb7a700594995ac3e9ba38bb936b34dbf0b12c50e06ca61aca1555c39c8c5b44183bc442657e964e574609755c0ffaaedc49c14631e84f9e84f6b25a7c
-
Filesize
512KB
MD5ee06f058b7c462c0372eb917722288c5
SHA190830d8448f99f83765ed22a44a8ef8c2b09b191
SHA2563fc0705bd7f242cd1c667b321e47eb98b823b8edf9705fca098f16376859e369
SHA5120e0b0a710565e82ec4f8eef58e956392af92b618113c05ede3443a773a392e9ffb6bc72ccc565f55031fc595eb1c0e8e21900b3f2835c66315d96095f144227c
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5a6a09a12ed792861a11973e722b119bd
SHA1e46fe3ccd8e95215648d9a7c74abac9223081e8f
SHA2565c2f5645e1693011e405d54a7241ac92c72cd9d5f5802b87db5665b947bc3670
SHA51230f8f2a17b115759827d7c539b53559ce004ae4402251ef7dfe1cf2131c4d8b0dddc974ca6e06dfe022863f55546355b4556101a4ae12fa82979c2b9f5483d72
-
Filesize
512KB
MD52f887c541c3fd898efbc9936801c8cf2
SHA177db2d5bedd0fb79d8318263b1fe602634aef006
SHA2564eed01b6d11eb7759babd06a0c1aa4a41f307432948c0756812f636478bc83ef
SHA5123468afa1f686e398b8c6c5632b579f9d3fe2f7b0138d52dfbae320358fbbcb1710b7d0e28cd82121e177bb0185b0528fbc4b6b5d0d22b12447e275aefa75c043