Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/09/2024, 06:26

General

  • Target

    e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    e1e2a51f4bed9b584bccb521b199bac8

  • SHA1

    6e78985940248bf47418ea617a406502b7d58be1

  • SHA256

    82a9956c3cdc8007b2d8c4b3ce009501df7f6089b8d8efe7df19bca4d176bfa9

  • SHA512

    decac079fc0743936c244d91126fde8eeed721ef394253e928285274e8b8b03e04df35f1e0669f2e34b86696d87d6afe4eccba662f4a14dde579ebdaa57a8c09

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6M:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5N

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3892
    • C:\Windows\SysWOW64\qwjhzkqyzg.exe
      qwjhzkqyzg.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2212
      • C:\Windows\SysWOW64\tbgkhqzx.exe
        C:\Windows\system32\tbgkhqzx.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2148
    • C:\Windows\SysWOW64\nlvrbdhjuqrjzhv.exe
      nlvrbdhjuqrjzhv.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3432
    • C:\Windows\SysWOW64\tbgkhqzx.exe
      tbgkhqzx.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4692
    • C:\Windows\SysWOW64\mlljmzrddqcrb.exe
      mlljmzrddqcrb.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1648
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:5040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    d04501e189da768a78efc56139a365fb

    SHA1

    b706471b893f7838d01369d69dfe0438833309a9

    SHA256

    99b5276c1fbb3bba4fd143497b1ff7d254354fa83e30e8e6f49b00d7296acbe1

    SHA512

    469159154fec4e657ea244f770eaa6e493b8a9d8dde90ee2f3efc91c51b286851ec129fe5da9884d5232b2a37744f8fc572075964521ce8b25d1332a7c6bf016

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    d337e6850ad370df06c547f7739b461b

    SHA1

    ad777c21b68362fe91465904d96f750abc50c3f6

    SHA256

    c1c57bddf00d4c6109d234016aef357153f46d86558eb162557c9fa622b87ebd

    SHA512

    1ae959d1c584b20568a0fa0eaf933e0cec69ee016f1e5b7b2fde192547afc74bf62cd190e8300d675999f3f5259bce703d8c052f9810b626d6921309db37762a

  • C:\Users\Admin\AppData\Local\Temp\TCDAB02.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    237B

    MD5

    98f405bdd83704bea522267650c8baca

    SHA1

    35457a08ed810fbd2ee4b7b57cb06e4e2983c6ff

    SHA256

    3e2ec4bd749637305f314f6614ceb4875d36dd088ad2563749e80e5b85eebe9b

    SHA512

    f89a4aa23d959bc7203c0ad51a7b12435d0989c5d0d6e50fa614a72e8ccacfd46d9acc78aa892fff3ec3c207c9ac8b7a6a0e364e6b2ad7bae0ccec7cb893cb9f

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    16B

    MD5

    d29962abc88624befc0135579ae485ec

    SHA1

    e40a6458296ec6a2427bcb280572d023a9862b31

    SHA256

    a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

    SHA512

    4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    674B

    MD5

    07d17060b3ae173acc7723025a2b4c20

    SHA1

    f9f6adbf4a2c4e3dd7fff645f855349688f4af62

    SHA256

    5afd33a5655308233bfe55803584448ba8ae854800a1e9eff3d9ab037b4f7e34

    SHA512

    170d56823d3fd121a024ac9e7ba3e647ad192def9faedfaf8619bf6c0ecff26e6024a5f89a23f69d3acab13305dac6603b940b744559b9f484115e14ed75a153

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    a74d8896925c6c7a432424ff3b0f99fa

    SHA1

    4d21b44ccb7e37a11a98e85295fd6422bacd5a01

    SHA256

    55f059787d93a5e9eeb2fb80dcf81967e420afdbf86248e51b11c3959d6bc38d

    SHA512

    d7a73aaf252bba819de3ad885266dccc652f1f1cfc701ac082940983eba65a2ac852168bd5161a85997b58730b7c7d23d2cd38a1f5bfaa5214f72ecc01fc3c4e

  • C:\Users\Admin\Desktop\CheckpointPublish.doc.exe

    Filesize

    512KB

    MD5

    a9a2f0199009ba3943d4bbba537e574c

    SHA1

    17870bea50a4cae7aad3e142ab3c259458fa2f14

    SHA256

    f792753c1f0722523fbeb711d0254ca411d1a5a80818508460f8d486f3d15ca7

    SHA512

    b952cae321341a61a89126113cbf67b6ef5c89e9b2f2a22371a77637dd9444c1838b4d5f581c938652e8e26788de9cf2af24df219e26b6edecea7ff8c51d0e17

  • C:\Windows\SysWOW64\mlljmzrddqcrb.exe

    Filesize

    512KB

    MD5

    ef6cfe3bf3b79667215fd25a2520e5f7

    SHA1

    ebf8ce3720ce80730940414d9afd6d3726f48819

    SHA256

    e4ac2c75131de4d47b12f60c6807d580ca565354ea410128940234fb6b4b2c67

    SHA512

    7cbe083b4654f3df1a421b897bbc2fff718e98ae64c2978df797bdeda1c1ad6e4ed23d56313b5b479ef22cd523676b4f74f4ccc27437a40ef39a938db2df7e13

  • C:\Windows\SysWOW64\nlvrbdhjuqrjzhv.exe

    Filesize

    512KB

    MD5

    892b18cbcdc009986f531fce849e15ad

    SHA1

    ff8e453802dea129c71fff04acc1ea5140ea64a5

    SHA256

    ab12306ead29893aa5de3fcce8f6ada2aa8490d28963a867db2f2bec5bdcae5e

    SHA512

    c0e497e97e83c5841265da5d8c778d65e663fdc6af63fafeca3680e7bf5d1c184610a2317a6f2511b116104e01b5abb04da8197637ae0f0bc5934a84d2abe73e

  • C:\Windows\SysWOW64\qwjhzkqyzg.exe

    Filesize

    512KB

    MD5

    42a8f1b3325524b20b5442be02a06df0

    SHA1

    9eed8c6b62e701745d689578a2d9dbf2aafd47c3

    SHA256

    04c4615e98a048051940762281d9c4d2c1a5fe0033bb1c5e4e67623f540b63cc

    SHA512

    ea18282617d09bdf92cb6d54469c4b8d690d521eb6951acaa967151a406d39a87629e61cc6a1ee37c795be7595ff7402b605225567c1b53961e6b40e4868641c

  • C:\Windows\SysWOW64\tbgkhqzx.exe

    Filesize

    512KB

    MD5

    e51baaa7cd035172f1ae4e3e328212a1

    SHA1

    c92ce75ed89013199b325b270d894149dfad07c8

    SHA256

    e66d12b69c2a304cae79b7aa07e2d4c82c350b7c3fe5ba7f5e8edf2f848ee49e

    SHA512

    0d1591eb6abd8ffe63a7c5aabbd49dd8875fe52b65d8e37c1c330fae7b2887563dc475428c56a594c7bee1deea7059f687a060001aeecab9da0aa6de117a2876

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    ea7957ad34afdcb8804f7068b132783e

    SHA1

    3c723bb02b2bee0488e54688957d25a8632c7156

    SHA256

    996bb53b91a0a874f4f8afe07c6b39176c33072da0c4d1b8268cf630b51e3324

    SHA512

    28b1deb325246c5cb24e9d31dec2697e817aeb6c1ba1fab55c8c5b2b83a962dbfa30b3a74951a93a64e50b660812bd7bb2569198fcd42e15e5990a4db0d72368

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    c58acfd12386943f5e5a48cc47fa5f2e

    SHA1

    68e02a5034e94c6835ce571b02c4993555bd370f

    SHA256

    eb76a7cd5d48d2179ed229453c09ff45ebee6db711a8872380364dc1d931f610

    SHA512

    1421432f7890340bb5de085ebb5a6936335a74e5fffbcaf629a9c5c254d72f58b253df34d7d57e4dc03cc4ab996e5bbf353a2d445466cdc9ca1fb37d082ba199

  • memory/3892-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/5040-37-0x00007FFD5C430000-0x00007FFD5C440000-memory.dmp

    Filesize

    64KB

  • memory/5040-38-0x00007FFD5C430000-0x00007FFD5C440000-memory.dmp

    Filesize

    64KB

  • memory/5040-36-0x00007FFD5C430000-0x00007FFD5C440000-memory.dmp

    Filesize

    64KB

  • memory/5040-39-0x00007FFD5C430000-0x00007FFD5C440000-memory.dmp

    Filesize

    64KB

  • memory/5040-42-0x00007FFD59E10000-0x00007FFD59E20000-memory.dmp

    Filesize

    64KB

  • memory/5040-43-0x00007FFD59E10000-0x00007FFD59E20000-memory.dmp

    Filesize

    64KB

  • memory/5040-35-0x00007FFD5C430000-0x00007FFD5C440000-memory.dmp

    Filesize

    64KB

  • memory/5040-609-0x00007FFD5C430000-0x00007FFD5C440000-memory.dmp

    Filesize

    64KB

  • memory/5040-612-0x00007FFD5C430000-0x00007FFD5C440000-memory.dmp

    Filesize

    64KB

  • memory/5040-610-0x00007FFD5C430000-0x00007FFD5C440000-memory.dmp

    Filesize

    64KB

  • memory/5040-611-0x00007FFD5C430000-0x00007FFD5C440000-memory.dmp

    Filesize

    64KB