Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2024, 09:14

General

  • Target

    d604b476e25e617d82cba2ec70e61d09_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    d604b476e25e617d82cba2ec70e61d09

  • SHA1

    2fff18e9d8bf2d8a6ea0de48ab624bb39effc152

  • SHA256

    ad2ef716bc4533dc33cdffbb9e1f3338bbefe12d671438f3af72324341ba3f86

  • SHA512

    df87bbc710cc7b0acb4e3ddc6a4b46ac20859db1dcc93f2febcc40a3124f12336bf1bbcad2a56cf38f8e566de2e0144f62c0a125108b4de04aeb838cc9c9b4d6

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6j:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5u

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d604b476e25e617d82cba2ec70e61d09_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d604b476e25e617d82cba2ec70e61d09_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4756
    • C:\Windows\SysWOW64\aadtotcdfa.exe
      aadtotcdfa.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3412
      • C:\Windows\SysWOW64\rbllpgsn.exe
        C:\Windows\system32\rbllpgsn.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4792
    • C:\Windows\SysWOW64\fbmtvbsakhsbgxw.exe
      fbmtvbsakhsbgxw.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2184
    • C:\Windows\SysWOW64\rbllpgsn.exe
      rbllpgsn.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2444
    • C:\Windows\SysWOW64\oiintxnlqbxkz.exe
      oiintxnlqbxkz.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1720
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    70eaa6fc1e50fd2c293edcbdbc37c9e8

    SHA1

    19fd67cca86402c706c07da418e7b94b826e879b

    SHA256

    63f54719bb831a28446a47398ab1c17299c4a3f84cefb9e23c9fd26db927cb54

    SHA512

    205ece84995803d5e898f719e1c55aedb4a5191ac41ea344db3e9b334f1f21aca86db8e8f33134800244aec49f64ea523c28ea221ef75469813e91c0f8614912

  • C:\Users\Admin\AppData\Local\Temp\TCDB514.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    299B

    MD5

    3a8fb4c0dc81c0838a48f448093485bf

    SHA1

    267ca041b1fcf944b11eb137e4fceec1d61eaff7

    SHA256

    45168b78832d0982c82b75f2f4f56125198fe54355370cf81aabe10d9ea1ed1b

    SHA512

    ef3d927cffdebbf586930c248ee75f1cecd9d215428f702180e083c8343f8a2e154bc711d68b0ecd40b3d81d8a9b7f6a58c00fd058b312f979e8d453ff43e908

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    678B

    MD5

    56712a1cbef31dab3385fb26bbd85229

    SHA1

    edd4e6ed8da1dc021aadd8f8df91f6fa66a3e575

    SHA256

    0c5fbf81673881f81a0b1dc2c37acf6e072d098a7543c8ac9fd877d2ce18a0e9

    SHA512

    8c32698a0805cac73dbe2f1cf49767720eb995dd7bab441fc1d380ab65985a41022ef108590f2b9ecd73359496b58bee6fe29e96d75d994ff95426190cbf1231

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    3b8e15a24d422b8437dd37a3e3965be6

    SHA1

    dc7f286d1d7ff14af08cbd18c63cc675401bba7b

    SHA256

    1b80bd9ce07d377dba235cf06503c077c8712df06cd8b64b8373b889adb48995

    SHA512

    44bfe8beb88f92ac89b41549ba7f9b9d3aec035d525b8e4cbb41ef6348f65e96aa72305df0d3bf6057b443077af8ce0ea08873cfd5ca474af2417d4e2b5d58d8

  • C:\Windows\SysWOW64\aadtotcdfa.exe

    Filesize

    512KB

    MD5

    ad1f882ddc9fa1fdf8c93f668bb62350

    SHA1

    b503cc059f0ebfd7357d0d14659463c8ee3d9b20

    SHA256

    ddd4899a5e6f4390043f135e7e9651502c307a52aa7b1af0be7c7f29ecf7d30e

    SHA512

    99b775f4ad937ed25ab543605832baa90f756a2747633d6d466e43213c412ed31869a4a10dd7be462cead1fa099fdb8ef04694d9831e1c513d2cc35912931fdb

  • C:\Windows\SysWOW64\fbmtvbsakhsbgxw.exe

    Filesize

    512KB

    MD5

    53a13634c1dbc70b5a30ec4735182650

    SHA1

    3b19dafb45aa13a74989af4cb5489927656afa6b

    SHA256

    4e98104e655e0fd2e9d71516daf18c403e7c0b9a1a912aeaeb1e92c9fdcf6ea9

    SHA512

    0013090c1bf8c2989ff5d1e29fefb9508fc4bf1ee403a233b8f3ef1cebb2b0b6346e874515aa2053815b719287a5151b393439534bbf25effb4e57d6583da206

  • C:\Windows\SysWOW64\oiintxnlqbxkz.exe

    Filesize

    512KB

    MD5

    b692020194ae9163a7622d897cd4d34e

    SHA1

    61ad583ad91a32170073bfc0b6f8e134c66d10ca

    SHA256

    ca360ebebe249b86c6483be9320743cfdc43359cff8a1b626f9b2843b67a228f

    SHA512

    c59a06d8c3ca2bd558ac5057d864f42b22a9bddc34e62f8b01ab6e7feaa4ce0141c9b61f0b961c5ee0625ba28f1dfdc2cdb8763dc5204212793c7e8b6799b52c

  • C:\Windows\SysWOW64\rbllpgsn.exe

    Filesize

    512KB

    MD5

    5f16a10e5a486a2a88f209b9bccf26b2

    SHA1

    aa2b195356c8597509b7cd837135e9fbf7f4de7c

    SHA256

    8f86e16db668e5e204f745e40af4a16c7aa13010db6b4b665c6d12f357995f63

    SHA512

    a35b39fdb80bae3f2f1a30e34682014201f13e0c69884efbc5293b6908d5005be7f8cca5b68cc5eac574145ebb1a5ecc85f0173e76b1a1e752c91aae162ac70e

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    c86de5ca2e0cc54f97725a6c861a686f

    SHA1

    f705090cd5e5a6f790a487c08443d50a5b150ad6

    SHA256

    abe63d09c37ba50d1face92d49599ab3bc1f8276a14d42359e71f7f2133b7d42

    SHA512

    d0c0d4fe64deac688cdc8dd3104f6bb501f1211c00fb2590695488f01288bdb6bd952e70773aec3166d535bebe917c13587b8482c5afe1488665f7b2a8702833

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    32d4ffeccdda67812f6c80670f8d6c2b

    SHA1

    14df895be2c1d34031bf23e3d952b9041563321b

    SHA256

    65485390ceb828f4321840408605df89a5687cfbac367a5d892faabf9ce728a7

    SHA512

    2a8cacbcd94d1c7b546d8add14eeb2bc10d3e64dbe5f8fd57b7f9e7a7ebab51788853016ed33901b3cf131e6925635d3510c0b4b6667cf0a2bb6a09c474dc8ad

  • memory/3440-40-0x00007FFD63D30000-0x00007FFD63D40000-memory.dmp

    Filesize

    64KB

  • memory/3440-41-0x00007FFD63D30000-0x00007FFD63D40000-memory.dmp

    Filesize

    64KB

  • memory/3440-43-0x00007FFD61660000-0x00007FFD61670000-memory.dmp

    Filesize

    64KB

  • memory/3440-38-0x00007FFD63D30000-0x00007FFD63D40000-memory.dmp

    Filesize

    64KB

  • memory/3440-39-0x00007FFD63D30000-0x00007FFD63D40000-memory.dmp

    Filesize

    64KB

  • memory/3440-42-0x00007FFD61660000-0x00007FFD61670000-memory.dmp

    Filesize

    64KB

  • memory/3440-37-0x00007FFD63D30000-0x00007FFD63D40000-memory.dmp

    Filesize

    64KB

  • memory/3440-602-0x00007FFD63D30000-0x00007FFD63D40000-memory.dmp

    Filesize

    64KB

  • memory/3440-604-0x00007FFD63D30000-0x00007FFD63D40000-memory.dmp

    Filesize

    64KB

  • memory/3440-605-0x00007FFD63D30000-0x00007FFD63D40000-memory.dmp

    Filesize

    64KB

  • memory/3440-603-0x00007FFD63D30000-0x00007FFD63D40000-memory.dmp

    Filesize

    64KB

  • memory/4756-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB