Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 22:23

General

  • Target

    db53214997f3f8f0ab3925730ef560aa_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    db53214997f3f8f0ab3925730ef560aa

  • SHA1

    831e75721a64692f52c56ba7ef8c94b09e84a927

  • SHA256

    e826ff5437728e84f7c12ba6a28d527bb45e2a8d5ef3e88933a9c99425d2aee0

  • SHA512

    d291e04f0e89f6e2b543793bd11a10ebf5d86a0a577a5ec11f3a05e02fd9bc9bd4ec5411cb2cbd665f2e35fe074534f72947e627de32cdc655cd2d7c13bd1424

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6X:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5m

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db53214997f3f8f0ab3925730ef560aa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\db53214997f3f8f0ab3925730ef560aa_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5088
    • C:\Windows\SysWOW64\qzpwafcplm.exe
      qzpwafcplm.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2392
      • C:\Windows\SysWOW64\egmbvcsl.exe
        C:\Windows\system32\egmbvcsl.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2860
    • C:\Windows\SysWOW64\kozhvxkindsoxmm.exe
      kozhvxkindsoxmm.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1648
    • C:\Windows\SysWOW64\egmbvcsl.exe
      egmbvcsl.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3784
    • C:\Windows\SysWOW64\zdvqwuaetrazp.exe
      zdvqwuaetrazp.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2528
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    3100a1f4dbfcb42697cc62786b1b3215

    SHA1

    a229b8b53462a962197396fd42b8a55f3038014d

    SHA256

    d4c47a95017240ccf43840493d12c09d3e85140fd9799d2654a5433c5932f639

    SHA512

    1ff2d11198d82c9a6de71901d921c41cd6379ab22b366e1dc12b2edf659f88ec953476c7db06bfc29aca18820380bfa7f474054d9a0a72f47268dab081f66a91

  • C:\Users\Admin\AppData\Local\Temp\TCD6F7.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    317B

    MD5

    fd71650527cfe6b43c0f1bf3ce44e685

    SHA1

    ab81264040390659859a58ffc977f4144785df47

    SHA256

    2379837096110874e03b1d94e154df264bf5d214e8d5d77b8fca5df55fadcb9c

    SHA512

    ca59ef0473a1240925fb09ed9c0aa61ef49430a2f0f2e1a1fd1f697e6e7e543b20ac882e320be8d2fbf087bbdadae19ec871578ff61f23c06d1f39d83b835006

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    2e5e48a6470457d711c2d6dc9331b814

    SHA1

    f3c4800b8fe27d779a12694e72bd75ae5dcdc98b

    SHA256

    f8b363edf56abc98a233690abbfcc779e2feb97c511109b57cb4c9e4e3666c83

    SHA512

    58ee409dcd35365e96f8de679c1f71a23fb38536a511c21338f22f6a6c7916f58911fed9919e968364ab4fbce3b7646b0a306c0d8ad572e12e728ca6fd8fc44f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    2KB

    MD5

    4837568414fa424cf60b1641b98360e7

    SHA1

    00ab2d1108aa73ed2d95f06e360759973556c727

    SHA256

    257f270c173fbe278ae69f3be2f0d6b4a7eb42b3946b8d1c053fad6b3904e631

    SHA512

    00aca1537044cc3b6ba958cff78e776ab88d1eda0ce98d653b3060c91c78c9daca6567a6d71ef67495f1505c734265b975957da1ed59944fc80fbf4234ecfa2b

  • C:\Users\Admin\Documents\BackupApprove.doc.exe

    Filesize

    512KB

    MD5

    5445bebb651a69ad984c3a46bf53e0b5

    SHA1

    664a5244256e1826dccf7c5ff7646184ebbdc044

    SHA256

    f06bd86356bcf0dd09a8672b3468970386447064af01cf78e74c0a5c6b27c6da

    SHA512

    f2d1ee6bb333ec7c6929d061366624715b7478b5952dae22caf01addba5c06cde5aa8f1244102ae2c05be9bcf9439d91104fe0f38f7493c49648cb63af8d9e76

  • C:\Windows\SysWOW64\egmbvcsl.exe

    Filesize

    512KB

    MD5

    c2652ca48f18d29982e7dd845af42b63

    SHA1

    9e11457e543336ea5e2a82ca1374f894b0f5034c

    SHA256

    2b6928ef46a58326a908bf44d661675fca13b377465a14bb0a1ab730b0bcf60e

    SHA512

    df3d4e29de1660b930b38bc958e37e4fbef3f74ff58b87cdc35efcdcb38e4a2bf0a49b3454c76291b05a303857f3386817804ef7e9a0a5fd3888887bed5de306

  • C:\Windows\SysWOW64\kozhvxkindsoxmm.exe

    Filesize

    512KB

    MD5

    1cb502f3b9b6e68b103b184944deb89f

    SHA1

    4306cc7251307fa7b98c8dbaf512ec118e847c30

    SHA256

    db5f5c551bc579beb586a5c887bbb072ed4d355664df99ec1fab251144924b85

    SHA512

    51dbd7dfa2bef8749cb1dd0d26b961c8b2293c2aad8ec95c08386ad850323bb26ff0e335c7ffe0d208ce812a41836f8cc1ea2dcc410f5bafa513c74aee836109

  • C:\Windows\SysWOW64\qzpwafcplm.exe

    Filesize

    512KB

    MD5

    7694480696fec322159515d0733d35c4

    SHA1

    ddb6ef3486da7c84cdd5d8db2c9fce2d99a1fe45

    SHA256

    9a90467cf3922ff5415c161d67115c0f40b110688eaab8e5c0d8e33ae9872f22

    SHA512

    6b48f708559b84191081005d1096c9ed8c4ccab99f46632939b3a740463fee01322c72d736ece6c385549166c895b26da10d64a22eaf4acf293dc58019330dd7

  • C:\Windows\SysWOW64\zdvqwuaetrazp.exe

    Filesize

    512KB

    MD5

    608c14b61cc0c4303935779b7b266202

    SHA1

    5e5731e17671c786ac7e89d3e877fb9ad3005709

    SHA256

    f926317bc9c8038949b9777caeac9a810324625c8125248b48029cca67fddacd

    SHA512

    4e8fe1e720c0ad45b3f08c17b6d4784e898a76f9b5331c3f05b6b214bf73e9de25ac99127b202b88319dbab2a11b3f5cd3a0561c9a0c34f7e2f00c3bccaf6555

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    65d61ecabd9980411dee6450fe9b3cff

    SHA1

    986a699e3e421c2d74e7657a764266f953e8f772

    SHA256

    5719934f93bd18274121ce32a20bfd1b64fcac656507f8f63c0f3f08a009cb0d

    SHA512

    cfc14dd5d6818828119db6ef7771d8fcbc1d73486bcbd9f3bcb6bd3f7d401ab681929eabbdfbbfa6c3a5170b1681432bec6d0e9ff301504cf07e6008bef10e0e

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    6206dbb964623aac0a5b78155fa4a759

    SHA1

    ed1bb98192dfb39ae46d8030618351832735b24b

    SHA256

    ca6a779e7341320762b4a0db02653b1886c088aa860fbc8c269364813a4e824c

    SHA512

    96d190e4fd623c94e0839ebdf7c0ab2fa424e0f77831a71f0e7915df6b83ed7f6d131117ce851122e6632fcac10256eef61a0261b540f5d090e68d437e859c18

  • memory/1964-250-0x00007FFDB80F0000-0x00007FFDB8100000-memory.dmp

    Filesize

    64KB

  • memory/1964-41-0x00007FFDB80F0000-0x00007FFDB8100000-memory.dmp

    Filesize

    64KB

  • memory/1964-40-0x00007FFDB80F0000-0x00007FFDB8100000-memory.dmp

    Filesize

    64KB

  • memory/1964-38-0x00007FFDB80F0000-0x00007FFDB8100000-memory.dmp

    Filesize

    64KB

  • memory/1964-39-0x00007FFDB80F0000-0x00007FFDB8100000-memory.dmp

    Filesize

    64KB

  • memory/1964-42-0x00007FFDB6040000-0x00007FFDB6050000-memory.dmp

    Filesize

    64KB

  • memory/1964-37-0x00007FFDB80F0000-0x00007FFDB8100000-memory.dmp

    Filesize

    64KB

  • memory/1964-43-0x00007FFDB6040000-0x00007FFDB6050000-memory.dmp

    Filesize

    64KB

  • memory/1964-253-0x00007FFDB80F0000-0x00007FFDB8100000-memory.dmp

    Filesize

    64KB

  • memory/1964-252-0x00007FFDB80F0000-0x00007FFDB8100000-memory.dmp

    Filesize

    64KB

  • memory/1964-251-0x00007FFDB80F0000-0x00007FFDB8100000-memory.dmp

    Filesize

    64KB

  • memory/5088-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB