Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2024, 02:07

General

  • Target

    d57d5ea560e477737a2b9fe8a55733dd_JaffaCakes118.exe

  • Size

    476KB

  • MD5

    d57d5ea560e477737a2b9fe8a55733dd

  • SHA1

    a2cf9826288e15d2107acd5ffc444665bd65cd36

  • SHA256

    ae4ad56a5e8cf751b1b792e78060de75430f19024fe95356b0baa6cc9ca9b3ba

  • SHA512

    64d9c51b7374b1a41606f711c5840d13f10cf5b9be0f61d17ba7a9e974c908c80b574794a3d4258588ef667188eaece130b4b4307782c4615b55cfb79228ba4d

  • SSDEEP

    6144:E8X8RUw9Oz5+iUU03pej1YpTYzOb0kLXhlJFTaLTGu0yvHcr+JB8aU9j1:nsRy+ZyYpaCDJFuPyAHcqrUR

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • UAC bypass 3 TTPs 13 IoCs
  • Adds policy Run key to start application 2 TTPs 29 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 3 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Looks up external IP address via web service 7 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 60 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 39 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d57d5ea560e477737a2b9fe8a55733dd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d57d5ea560e477737a2b9fe8a55733dd_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Users\Admin\AppData\Local\Temp\unvumojhexf.exe
      "C:\Users\Admin\AppData\Local\Temp\unvumojhexf.exe" "c:\users\admin\appdata\local\temp\d57d5ea560e477737a2b9fe8a55733dd_jaffacakes118.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:5116
      • C:\Users\Admin\AppData\Local\Temp\hqbyfn.exe
        "C:\Users\Admin\AppData\Local\Temp\hqbyfn.exe" "-c:\users\admin\appdata\local\temp\d57d5ea560e477737a2b9fe8a55733dd_jaffacakes118.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Impair Defenses: Safe Mode Boot
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • System policy modification
        PID:4992
      • C:\Users\Admin\AppData\Local\Temp\hqbyfn.exe
        "C:\Users\Admin\AppData\Local\Temp\hqbyfn.exe" "-c:\users\admin\appdata\local\temp\d57d5ea560e477737a2b9fe8a55733dd_jaffacakes118.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System policy modification
        PID:4164
    • C:\Users\Admin\AppData\Local\Temp\unvumojhexf.exe
      "C:\Users\Admin\AppData\Local\Temp\unvumojhexf.exe" "c:\users\admin\appdata\local\temp\d57d5ea560e477737a2b9fe8a55733dd_jaffacakes118.exe"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System policy modification
      PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\weokqxakkvikdplasdlvrxehrrc.rkw

    Filesize

    120B

    MD5

    10fe36688485d641edd9a00c02d6f947

    SHA1

    f69373522d8406b9708b7f89a90f0e1b13e58fd0

    SHA256

    6f9c49057e3f335319650ca8d0fd89134f436aa0a9a4cc9be868949fea72276b

    SHA512

    9c8ee5736204d2851f14d5c0ef5ebbcc2570bfa0f8a4927a25e030173eb557bdb6bc9c1583710fb4124a31dfcfb4afdcad8c354f675b89bd71162d1e98195502

  • C:\Program Files (x86)\weokqxakkvikdplasdlvrxehrrc.rkw

    Filesize

    120B

    MD5

    d05de28bcdb5cc52312da55a83c981cb

    SHA1

    93d1e31bb93ec589e2715409b606873b435744ae

    SHA256

    ca60460580bf33d7cfc00c524d58c12640916310a46f3cbf5e53d3abe6b4a328

    SHA512

    f4ac173ce60887577c943c911c41d029d24fc35441dc346a932794806a109b857934d71c43826d159188fc680f38d2b6016447349e04cf6fa386ad3ce5da1074

  • C:\Program Files (x86)\weokqxakkvikdplasdlvrxehrrc.rkw

    Filesize

    120B

    MD5

    259d900794d6eab94d749b10b15dcc1f

    SHA1

    a1d716fb4a42320fcb69de7b4932adb1b0f6ee67

    SHA256

    d8e3635b4f19db4c2a373a93370da2f2919def22f6b7434a26023429a9f62234

    SHA512

    2d1bd77345cb9e223bf1b75e004e395481ba99dec6d6913201fc760f9663b28cfb7f98202b1a3b7365486aaef0bce856c0e4a2cff9c482c14a14e58ffde3e347

  • C:\Users\Admin\AppData\Local\Temp\hqbyfn.exe

    Filesize

    688KB

    MD5

    bce873da9077490251edb62eacd08dc0

    SHA1

    925f4efe6450e24e6c8bf4474ad86bdb91ce4e82

    SHA256

    2edd6c943b4280b54e9abb0f979c680b36a828dab09e26ea8e78da3e852f8583

    SHA512

    4d2b6dccd5865b28c8d90d41f03445f4f1a6490b096ba7d8d4cf2f13543201bb2918abba23d0edac5e916e5fc5eb94ede8c674ce1bffb39ce1e2018617c45564

  • C:\Users\Admin\AppData\Local\Temp\unvumojhexf.exe

    Filesize

    308KB

    MD5

    85cb856b920e7b0b7b75115336fc2af2

    SHA1

    1d1a207efec2f5187583b652c35aef74ee4c473f

    SHA256

    6fff20aabe8265b6e811c9dbcb987f9c15cf07d1d8b80ced7b287d96900f5c62

    SHA512

    120ff9c77c19216e5691b6ba812f09f7db7b46685a391027fff56e5b73200f4211b6bac2c2d28cdfe461d1fbf10f1a3204adeedbd0a34a034a862c6278d901e8

  • C:\Users\Admin\AppData\Local\tmhofxlgrnlyczggjfytarjxsdzxkolssvrkfm.vje

    Filesize

    3KB

    MD5

    824ffce86c4e69c940f67a7689a27adc

    SHA1

    52915dbd2412f4fe1f221f2165f86a7e19253477

    SHA256

    15550d2ac2bb0e8cecb9fafe0be03b94325f858c930a1c1a7d7f66bcac7470da

    SHA512

    234f912927ec30526a7111da2e060e4ce01d0506df7df9ac7b6cd2e7aeff965b8c2c2f9fe262525c06e098727c02fcab9536702aa6ad91f564cb5140791c2fde

  • C:\Users\Admin\AppData\Local\weokqxakkvikdplasdlvrxehrrc.rkw

    Filesize

    120B

    MD5

    61f0e9d1963cac364283808c38f4268c

    SHA1

    51d4b1feb649c5f99d2360d20957a834fa9fa653

    SHA256

    5dcd2107596219f5f0e9eeaf0d210e1357e96cf5dc141dd290ecd301993c8da6

    SHA512

    945a1c953e8af896bf35e645f8ce659f8c8f67471fd2df1983ba608c05ae7c140f2909ee637e3a863aa5f6726b24ed22eed4b0f4b7e2ea9565d22301c4aa4e82

  • C:\Users\Admin\AppData\Local\weokqxakkvikdplasdlvrxehrrc.rkw

    Filesize

    120B

    MD5

    d703f1d7bbf9e245cd5b20ffd39b31d3

    SHA1

    6104b3040a5ad04d70cfa6b7f9a7fcc7325c17fe

    SHA256

    e558b08acb01df4d18acd1a816e4f6b2ac98a8f4de024276e66c5ecd3463ca43

    SHA512

    9f6ce2146066c048080a70e54142453e77784fa4317770571a432349c57882e1e84b0b392d72f71c41f01d21cce59c9e3bd13dc1defc3c7e5548c8dd2103ae9e

  • C:\Users\Admin\AppData\Local\weokqxakkvikdplasdlvrxehrrc.rkw

    Filesize

    120B

    MD5

    2e4cc31a8a84978fbbd0110884cda581

    SHA1

    e456f76611119e067f6bcaeb5e959f2e1d8b25fd

    SHA256

    21d0c2e746539dc48aef7836b18cb2312de568a984a7b370f845ef3fded7b294

    SHA512

    cca882e3605da13f306fb7a7cdc5ee1b86ee432ac3e3974c9238a4ef75972ae440bdfcb0041b5941f2cb99364a25b31968f1b6b19a1b25fb47422a7b4e85d1ae

  • C:\Windows\SysWOW64\jebkdxnkxvvkqpyafd.exe

    Filesize

    476KB

    MD5

    d57d5ea560e477737a2b9fe8a55733dd

    SHA1

    a2cf9826288e15d2107acd5ffc444665bd65cd36

    SHA256

    ae4ad56a5e8cf751b1b792e78060de75430f19024fe95356b0baa6cc9ca9b3ba

    SHA512

    64d9c51b7374b1a41606f711c5840d13f10cf5b9be0f61d17ba7a9e974c908c80b574794a3d4258588ef667188eaece130b4b4307782c4615b55cfb79228ba4d

  • C:\juhgpzfs.bat

    Filesize

    508KB

    MD5

    96f7d9828d29761ce44e087ee4875603

    SHA1

    51b5fa4c04891d325f174e91f777776a994a5631

    SHA256

    6ff45728bef1f06a56589e2c4051498531b7d4b82e45e70edc993bc911e13971

    SHA512

    5cdaddf33751a3d505d6d1f36059aa95654a4c05d60e8aaf3880665fa858401a871bb183ec66dedbbba5ab40e1f6086d128382da68dff40cc4d479d2dc6a36d0