Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 01:58

General

  • Target

    d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    d3480587506aa97cf6e06b8043ed83e4

  • SHA1

    96cbc8819d5c747943caadebdac01433707c445e

  • SHA256

    1d1e89d2b70fe9e6759e636e1bbb71c282180f9f7e9946fc1e61b2b35c43c762

  • SHA512

    624505b9b315d3ad80ba5e3848fccf0a1ee0d5152f7bdca00a65ccb376db0e83eedbdd619b27d8df13d37e1662776a1fe58bb8aee3a3848d9a0afb475618a7c2

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6c:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5v

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d3480587506aa97cf6e06b8043ed83e4_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3424
    • C:\Windows\SysWOW64\goirhprykg.exe
      goirhprykg.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3604
      • C:\Windows\SysWOW64\pbrholuq.exe
        C:\Windows\system32\pbrholuq.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:752
    • C:\Windows\SysWOW64\gxhtglidohsyzby.exe
      gxhtglidohsyzby.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:852
    • C:\Windows\SysWOW64\pbrholuq.exe
      pbrholuq.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2432
    • C:\Windows\SysWOW64\zqsinpawvtwpo.exe
      zqsinpawvtwpo.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:640
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    6c6dfa011d80ac94d9e7e64b61515e0e

    SHA1

    f5de8a61e51a2686f9c5d39aafecd95c8aa876d9

    SHA256

    e4366fc49a1a09e47b67886df3c7895e21296765c18545e4d654cfffe142f26c

    SHA512

    c3d3624678e71dd8a6691450b8cefa78fd61e1b70a16088419552f955423e2a85acdba21a87284188c743f45917b0037a67f345ad6fcd2f9967a6486d78fff09

  • C:\Users\Admin\AppData\Local\Temp\TCDDF34.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    346B

    MD5

    baf8ae4bdea77a791dc8d731b255db17

    SHA1

    db273c7892f5c00a2f1927184fc79cc9d7443b09

    SHA256

    0ac778f626874fa5c4cbcc36468acdb9cfabca2605b96f64bf90b3334b2e5ca5

    SHA512

    8e1b338653012216586aaae2e40fe8a94e58d131361bb70a73792b7b7471a4aab33d15daef474ee80e52aa9cca726e0890d9ebe0e113fd4e4373e5f2a605c060

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    16B

    MD5

    d29962abc88624befc0135579ae485ec

    SHA1

    e40a6458296ec6a2427bcb280572d023a9862b31

    SHA256

    a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

    SHA512

    4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    918f52e1fc432eb6d0cb6ab0537de38f

    SHA1

    ea81ed5e5eabdb7ccc05f5c4e1b7d6521112890f

    SHA256

    b23d184faa1fa3d73da304dad8f57fcb241de25fc3bc6abd48903d71d189bf7d

    SHA512

    678c6d80d53b97097b1218caf0b539c552daad5c40b1ae1f614438dfb493c0f1aaaa03b85d66bcaf6c2b3c6ee9d8ef6385589a2aada54ae854cf5c874ad7886c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    2KB

    MD5

    869819faa1dcfbb0d8bfd2f30111e6ab

    SHA1

    5c1f820a3e36a4531783821a1f0b91142670ee77

    SHA256

    e1937b38964469c1dc9377a6374dcad1fbf26cefaa2a3be0eda03d102d645d70

    SHA512

    8fc4f147d1d550163b45856aef887ff43f8e4382594b3e4505eb32cc0e0257c4d57fcc04e157e745a1d2bbec665a092bc470cb68b30186874bad623b232b3b53

  • C:\Users\Admin\Documents\OptimizeStep.doc.exe

    Filesize

    512KB

    MD5

    dae870a3c22af0a7ab214fde89f14f56

    SHA1

    c802bddf301a228d1eed2f333001cacfa9530ff8

    SHA256

    54a5861b9076f1346229c95f96bbc0ef22993be490eae732f2a215ed029640da

    SHA512

    8d7035d604a0db4a05e6ed9d7562df83d5fefba424c0d48cfb5ecf2f0905f626963c6ca94c89f43ccd5d388b8fd6380bf54de5cb0234a61d73ec7b311c5b877b

  • C:\Windows\SysWOW64\goirhprykg.exe

    Filesize

    512KB

    MD5

    2fc9184375d11d88049b4f6be94c3450

    SHA1

    d3626e87310115d9add7a697560272b85e0eb9ff

    SHA256

    7cb0696ead42aacf616573d15f5b24170f7cbcd67ab90f3c5d5dcda3a2af248f

    SHA512

    e5cd1b941266848015c03796b01045f4cfe33447377c1c8416ed952d2d921ebca21fee055d0c28b41c7cda7a8d69354c1beb913fadc2847b59b7c3e9fac92bba

  • C:\Windows\SysWOW64\gxhtglidohsyzby.exe

    Filesize

    512KB

    MD5

    3fcc140e33657bf3dedeef9184b9abf0

    SHA1

    f6ea5a9bad501da0e535bc53b22089a55411d603

    SHA256

    76794885782eaedab96fb7be01b45418a8689e19fee76ce97d5f39e3bec017b9

    SHA512

    3fe6c4448a4bacabb60eb4fb9de8592d19045b478baf8c7744595e9a1ad83f7e2ffae9a31b32a147c5bc0f095178c16d0636b0e3bdc85d0f3009c611e32bf470

  • C:\Windows\SysWOW64\pbrholuq.exe

    Filesize

    512KB

    MD5

    27d487e5351a04674c76adfd8a400643

    SHA1

    6fbce6b83b692c93845c1606f313b0c5603b0112

    SHA256

    e3c3e16e4f9030b3050726d4add1814fc7d743e9d840e237f7b3f630a26fe74e

    SHA512

    5147f4bb7a700594995ac3e9ba38bb936b34dbf0b12c50e06ca61aca1555c39c8c5b44183bc442657e964e574609755c0ffaaedc49c14631e84f9e84f6b25a7c

  • C:\Windows\SysWOW64\zqsinpawvtwpo.exe

    Filesize

    512KB

    MD5

    ee06f058b7c462c0372eb917722288c5

    SHA1

    90830d8448f99f83765ed22a44a8ef8c2b09b191

    SHA256

    3fc0705bd7f242cd1c667b321e47eb98b823b8edf9705fca098f16376859e369

    SHA512

    0e0b0a710565e82ec4f8eef58e956392af92b618113c05ede3443a773a392e9ffb6bc72ccc565f55031fc595eb1c0e8e21900b3f2835c66315d96095f144227c

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    a6a09a12ed792861a11973e722b119bd

    SHA1

    e46fe3ccd8e95215648d9a7c74abac9223081e8f

    SHA256

    5c2f5645e1693011e405d54a7241ac92c72cd9d5f5802b87db5665b947bc3670

    SHA512

    30f8f2a17b115759827d7c539b53559ce004ae4402251ef7dfe1cf2131c4d8b0dddc974ca6e06dfe022863f55546355b4556101a4ae12fa82979c2b9f5483d72

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    2f887c541c3fd898efbc9936801c8cf2

    SHA1

    77db2d5bedd0fb79d8318263b1fe602634aef006

    SHA256

    4eed01b6d11eb7759babd06a0c1aa4a41f307432948c0756812f636478bc83ef

    SHA512

    3468afa1f686e398b8c6c5632b579f9d3fe2f7b0138d52dfbae320358fbbcb1710b7d0e28cd82121e177bb0185b0528fbc4b6b5d0d22b12447e275aefa75c043

  • memory/1064-36-0x00007FFC92E70000-0x00007FFC92E80000-memory.dmp

    Filesize

    64KB

  • memory/1064-38-0x00007FFC92E70000-0x00007FFC92E80000-memory.dmp

    Filesize

    64KB

  • memory/1064-39-0x00007FFC92E70000-0x00007FFC92E80000-memory.dmp

    Filesize

    64KB

  • memory/1064-37-0x00007FFC92E70000-0x00007FFC92E80000-memory.dmp

    Filesize

    64KB

  • memory/1064-40-0x00007FFC90A90000-0x00007FFC90AA0000-memory.dmp

    Filesize

    64KB

  • memory/1064-43-0x00007FFC90A90000-0x00007FFC90AA0000-memory.dmp

    Filesize

    64KB

  • memory/1064-35-0x00007FFC92E70000-0x00007FFC92E80000-memory.dmp

    Filesize

    64KB

  • memory/1064-613-0x00007FFC92E70000-0x00007FFC92E80000-memory.dmp

    Filesize

    64KB

  • memory/1064-612-0x00007FFC92E70000-0x00007FFC92E80000-memory.dmp

    Filesize

    64KB

  • memory/1064-615-0x00007FFC92E70000-0x00007FFC92E80000-memory.dmp

    Filesize

    64KB

  • memory/1064-614-0x00007FFC92E70000-0x00007FFC92E80000-memory.dmp

    Filesize

    64KB

  • memory/3424-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB