Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 06:26

General

  • Target

    e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    e1e2a51f4bed9b584bccb521b199bac8

  • SHA1

    6e78985940248bf47418ea617a406502b7d58be1

  • SHA256

    82a9956c3cdc8007b2d8c4b3ce009501df7f6089b8d8efe7df19bca4d176bfa9

  • SHA512

    decac079fc0743936c244d91126fde8eeed721ef394253e928285274e8b8b03e04df35f1e0669f2e34b86696d87d6afe4eccba662f4a14dde579ebdaa57a8c09

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6M:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5N

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 19 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Windows\SysWOW64\wumpazsjwv.exe
      wumpazsjwv.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\Windows\SysWOW64\jirphyhi.exe
        C:\Windows\system32\jirphyhi.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2016
    • C:\Windows\SysWOW64\jslpxbkoctgwfrw.exe
      jslpxbkoctgwfrw.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2328
    • C:\Windows\SysWOW64\jirphyhi.exe
      jirphyhi.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1832
    • C:\Windows\SysWOW64\egfcdsfnarhqu.exe
      egfcdsfnarhqu.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1852
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      55300f8a92c701dafa4b75f2838f292a

      SHA1

      45e1a8b39c55ad288eafff9c810a9de378cdf0bc

      SHA256

      f6acc3b9ee3b496ef63beb0fd23fc9757144c861c37cb536f15cfa7037421c3c

      SHA512

      487d1938821b17737017e54b3c2ab681904395cbe62f2a6b09309fa35a6afc09ffcb6057beff6c8df67db66cd64cc9a04cd5ce83c1e8d186b828cc03d3d72029

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      b13ba5b34a1229a567c2c086d568c1cc

      SHA1

      7733d8174b87e500cd1572d795ea79fad1d43f5b

      SHA256

      dd2f307f282aab00e2ddbcf6df36dd08818271b5515a1d65ecf7422b9cc525b8

      SHA512

      36285604073c77a1355126471cd030eae6752e20fc569a5a601cfd5addf54725a61d8fecff91aac042dd90e530ca4ce8a822eb536736b6ca0aa905bbd7b513ec

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      dc08521aa32c76ea599b721004b8ac1d

      SHA1

      6f9a98b36634694a4e3847f6b8a1e23ceb3d03d6

      SHA256

      8f2b7e326b4a47ff916b58cc329ad964a7813fe6dccc0b519660ede8ae4ff2fe

      SHA512

      493971476caf1a39a78f559c857a7e6de84387e500d975ab88e406eb86604f757486935499f1d5992a3223c36d9d2434f4eeb6cc5915ccf2938156bdd4d5910e

    • C:\Windows\SysWOW64\egfcdsfnarhqu.exe

      Filesize

      512KB

      MD5

      fc2172d02aec033680e73129e4e435bd

      SHA1

      754a774d3d508dd44ed56eefa08f9cf45a0fdd66

      SHA256

      d7c6bce5cac1c66a2bad7f9dbfe304f826ceb0e6cb9024afd10db569d0cf9c24

      SHA512

      2877c9739ce8f6536be9191e5671c0456b3b2db3a2f2533a174de3317dfa1bc4ba9523743ae0165b264bfaf2faf76a958a82eab7935ede5e9676a1143a5c5ce7

    • C:\Windows\SysWOW64\jirphyhi.exe

      Filesize

      512KB

      MD5

      80a68e1d7ac5e7efe5ff88939a2aa078

      SHA1

      c91845385b2e2a26bf19f342c922f2b88046da4e

      SHA256

      fc835ca856ed1c7ff5777bc357d12b6041bcfb694aee8e328a00295aa7534f38

      SHA512

      e197686878142fdbd840a37a5ba74e6d5620b2b67220a5a0580515962db6c1aa1168b354bf2a65d344e831e7ebc63730056ce3c8d7fd3430e5f13811a92e10bb

    • C:\Windows\SysWOW64\wumpazsjwv.exe

      Filesize

      512KB

      MD5

      1620e2fe21c2d93914ba2d1d7228babc

      SHA1

      0c64aaf78a378b6f8b7683a2d1cbcc2d3d17752e

      SHA256

      8db27d516ccb0a031bdbd17caa10c1121b479cf45a1c0d27316b8530ecb9bff7

      SHA512

      c247e3049f0b2eb26f2edf57751222e8970e12aa190b3aecbe38b97875af006439c0e56820b5076cd3a7d85cd23ad27ccbca293f65e87bac93ad58af84138fdd

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\jslpxbkoctgwfrw.exe

      Filesize

      512KB

      MD5

      946347cbe2740c91a5b1bcd919487b8b

      SHA1

      02fda0f73475bf8893f39199a166a5691c3c656d

      SHA256

      40c9b5b0ab9fd606808334fe2dc43d21d4127b79220c9faf89db454c91d9ba17

      SHA512

      8dd73c6374d20d768164044b777474ed5362d67e0cc79925da857afe7abd7e1c1f3c1ef4befd323fdef1e0dd6510eedbb52d0055988d4eb1eb2a0036288b3861

    • memory/1712-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1712-90-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2508-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB