Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe
-
Size
512KB
-
MD5
e1e2a51f4bed9b584bccb521b199bac8
-
SHA1
6e78985940248bf47418ea617a406502b7d58be1
-
SHA256
82a9956c3cdc8007b2d8c4b3ce009501df7f6089b8d8efe7df19bca4d176bfa9
-
SHA512
decac079fc0743936c244d91126fde8eeed721ef394253e928285274e8b8b03e04df35f1e0669f2e34b86696d87d6afe4eccba662f4a14dde579ebdaa57a8c09
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6M:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5N
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" qwjhzkqyzg.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qwjhzkqyzg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" qwjhzkqyzg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" qwjhzkqyzg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" qwjhzkqyzg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" qwjhzkqyzg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" qwjhzkqyzg.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" qwjhzkqyzg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
pid Process 2212 qwjhzkqyzg.exe 3432 nlvrbdhjuqrjzhv.exe 4692 tbgkhqzx.exe 1648 mlljmzrddqcrb.exe 2148 tbgkhqzx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" qwjhzkqyzg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" qwjhzkqyzg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" qwjhzkqyzg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" qwjhzkqyzg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" qwjhzkqyzg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" qwjhzkqyzg.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nqrrbzbv = "qwjhzkqyzg.exe" nlvrbdhjuqrjzhv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zozxhjoa = "nlvrbdhjuqrjzhv.exe" nlvrbdhjuqrjzhv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "mlljmzrddqcrb.exe" nlvrbdhjuqrjzhv.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: qwjhzkqyzg.exe File opened (read-only) \??\i: qwjhzkqyzg.exe File opened (read-only) \??\s: qwjhzkqyzg.exe File opened (read-only) \??\h: tbgkhqzx.exe File opened (read-only) \??\e: tbgkhqzx.exe File opened (read-only) \??\l: tbgkhqzx.exe File opened (read-only) \??\z: qwjhzkqyzg.exe File opened (read-only) \??\g: tbgkhqzx.exe File opened (read-only) \??\m: qwjhzkqyzg.exe File opened (read-only) \??\r: qwjhzkqyzg.exe File opened (read-only) \??\v: qwjhzkqyzg.exe File opened (read-only) \??\o: tbgkhqzx.exe File opened (read-only) \??\u: tbgkhqzx.exe File opened (read-only) \??\n: tbgkhqzx.exe File opened (read-only) \??\u: tbgkhqzx.exe File opened (read-only) \??\t: qwjhzkqyzg.exe File opened (read-only) \??\u: qwjhzkqyzg.exe File opened (read-only) \??\v: tbgkhqzx.exe File opened (read-only) \??\q: qwjhzkqyzg.exe File opened (read-only) \??\q: tbgkhqzx.exe File opened (read-only) \??\n: qwjhzkqyzg.exe File opened (read-only) \??\w: qwjhzkqyzg.exe File opened (read-only) \??\e: tbgkhqzx.exe File opened (read-only) \??\k: tbgkhqzx.exe File opened (read-only) \??\n: tbgkhqzx.exe File opened (read-only) \??\y: tbgkhqzx.exe File opened (read-only) \??\a: tbgkhqzx.exe File opened (read-only) \??\h: qwjhzkqyzg.exe File opened (read-only) \??\o: qwjhzkqyzg.exe File opened (read-only) \??\w: tbgkhqzx.exe File opened (read-only) \??\x: tbgkhqzx.exe File opened (read-only) \??\j: qwjhzkqyzg.exe File opened (read-only) \??\y: qwjhzkqyzg.exe File opened (read-only) \??\b: tbgkhqzx.exe File opened (read-only) \??\i: tbgkhqzx.exe File opened (read-only) \??\e: qwjhzkqyzg.exe File opened (read-only) \??\q: tbgkhqzx.exe File opened (read-only) \??\t: tbgkhqzx.exe File opened (read-only) \??\l: qwjhzkqyzg.exe File opened (read-only) \??\j: tbgkhqzx.exe File opened (read-only) \??\t: tbgkhqzx.exe File opened (read-only) \??\x: tbgkhqzx.exe File opened (read-only) \??\p: tbgkhqzx.exe File opened (read-only) \??\b: qwjhzkqyzg.exe File opened (read-only) \??\g: qwjhzkqyzg.exe File opened (read-only) \??\g: tbgkhqzx.exe File opened (read-only) \??\m: tbgkhqzx.exe File opened (read-only) \??\r: tbgkhqzx.exe File opened (read-only) \??\b: tbgkhqzx.exe File opened (read-only) \??\j: tbgkhqzx.exe File opened (read-only) \??\m: tbgkhqzx.exe File opened (read-only) \??\z: tbgkhqzx.exe File opened (read-only) \??\p: qwjhzkqyzg.exe File opened (read-only) \??\o: tbgkhqzx.exe File opened (read-only) \??\a: tbgkhqzx.exe File opened (read-only) \??\l: tbgkhqzx.exe File opened (read-only) \??\k: qwjhzkqyzg.exe File opened (read-only) \??\p: tbgkhqzx.exe File opened (read-only) \??\i: tbgkhqzx.exe File opened (read-only) \??\k: tbgkhqzx.exe File opened (read-only) \??\s: tbgkhqzx.exe File opened (read-only) \??\y: tbgkhqzx.exe File opened (read-only) \??\h: tbgkhqzx.exe File opened (read-only) \??\r: tbgkhqzx.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" qwjhzkqyzg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" qwjhzkqyzg.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3892-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x00090000000233fa-6.dat autoit_exe behavioral2/files/0x00090000000233ae-19.dat autoit_exe behavioral2/files/0x000700000002340f-32.dat autoit_exe behavioral2/files/0x000700000002340e-29.dat autoit_exe behavioral2/files/0x00080000000233f5-68.dat autoit_exe behavioral2/files/0x000700000002341c-73.dat autoit_exe behavioral2/files/0x0007000000023422-85.dat autoit_exe behavioral2/files/0x0007000000023428-103.dat autoit_exe behavioral2/files/0x0007000000023428-106.dat autoit_exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\qwjhzkqyzg.exe e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\qwjhzkqyzg.exe e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe File created C:\Windows\SysWOW64\nlvrbdhjuqrjzhv.exe e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\nlvrbdhjuqrjzhv.exe e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe tbgkhqzx.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe tbgkhqzx.exe File created C:\Windows\SysWOW64\tbgkhqzx.exe e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\tbgkhqzx.exe e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe File created C:\Windows\SysWOW64\mlljmzrddqcrb.exe e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mlljmzrddqcrb.exe e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll qwjhzkqyzg.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe tbgkhqzx.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe tbgkhqzx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal tbgkhqzx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe tbgkhqzx.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe tbgkhqzx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe tbgkhqzx.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe tbgkhqzx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal tbgkhqzx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe tbgkhqzx.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe tbgkhqzx.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe tbgkhqzx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal tbgkhqzx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal tbgkhqzx.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe tbgkhqzx.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe tbgkhqzx.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe tbgkhqzx.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe tbgkhqzx.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe tbgkhqzx.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe tbgkhqzx.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe tbgkhqzx.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe tbgkhqzx.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe tbgkhqzx.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe tbgkhqzx.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe tbgkhqzx.exe File opened for modification C:\Windows\mydoc.rtf e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe tbgkhqzx.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe tbgkhqzx.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe tbgkhqzx.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe tbgkhqzx.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe tbgkhqzx.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe tbgkhqzx.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe tbgkhqzx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qwjhzkqyzg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlvrbdhjuqrjzhv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbgkhqzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mlljmzrddqcrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbgkhqzx.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E78468B4FF6622DAD272D1A48A7B9017" e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "194AC67E1491DBB3B8CC7C97ED9134C8" e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf qwjhzkqyzg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" qwjhzkqyzg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" qwjhzkqyzg.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFCFF8B482C851B9135D62D7E97BD90E136584667446245D7ED" e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" qwjhzkqyzg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh qwjhzkqyzg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" qwjhzkqyzg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs qwjhzkqyzg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABBFAB8FE6BF2E0830B3B4586EC39E2B38A038A42110333E2C442E809D3" e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB0B128479039E953BDB9D3339FD4CE" e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat qwjhzkqyzg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" qwjhzkqyzg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg qwjhzkqyzg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32422D7F9C2383576D3676A277272DD77C8464DE" e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc qwjhzkqyzg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" qwjhzkqyzg.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5040 WINWORD.EXE 5040 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3432 nlvrbdhjuqrjzhv.exe 3432 nlvrbdhjuqrjzhv.exe 3432 nlvrbdhjuqrjzhv.exe 3432 nlvrbdhjuqrjzhv.exe 3432 nlvrbdhjuqrjzhv.exe 3432 nlvrbdhjuqrjzhv.exe 3432 nlvrbdhjuqrjzhv.exe 3432 nlvrbdhjuqrjzhv.exe 3432 nlvrbdhjuqrjzhv.exe 3432 nlvrbdhjuqrjzhv.exe 4692 tbgkhqzx.exe 4692 tbgkhqzx.exe 4692 tbgkhqzx.exe 4692 tbgkhqzx.exe 4692 tbgkhqzx.exe 4692 tbgkhqzx.exe 4692 tbgkhqzx.exe 4692 tbgkhqzx.exe 2212 qwjhzkqyzg.exe 2212 qwjhzkqyzg.exe 2212 qwjhzkqyzg.exe 2212 qwjhzkqyzg.exe 2212 qwjhzkqyzg.exe 2212 qwjhzkqyzg.exe 2212 qwjhzkqyzg.exe 2212 qwjhzkqyzg.exe 2212 qwjhzkqyzg.exe 2212 qwjhzkqyzg.exe 1648 mlljmzrddqcrb.exe 1648 mlljmzrddqcrb.exe 1648 mlljmzrddqcrb.exe 1648 mlljmzrddqcrb.exe 1648 mlljmzrddqcrb.exe 1648 mlljmzrddqcrb.exe 1648 mlljmzrddqcrb.exe 1648 mlljmzrddqcrb.exe 1648 mlljmzrddqcrb.exe 1648 mlljmzrddqcrb.exe 1648 mlljmzrddqcrb.exe 1648 mlljmzrddqcrb.exe 3432 nlvrbdhjuqrjzhv.exe 3432 nlvrbdhjuqrjzhv.exe 1648 mlljmzrddqcrb.exe 1648 mlljmzrddqcrb.exe 1648 mlljmzrddqcrb.exe 1648 mlljmzrddqcrb.exe 2148 tbgkhqzx.exe 2148 tbgkhqzx.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3432 nlvrbdhjuqrjzhv.exe 3432 nlvrbdhjuqrjzhv.exe 3432 nlvrbdhjuqrjzhv.exe 4692 tbgkhqzx.exe 4692 tbgkhqzx.exe 4692 tbgkhqzx.exe 2212 qwjhzkqyzg.exe 1648 mlljmzrddqcrb.exe 2212 qwjhzkqyzg.exe 1648 mlljmzrddqcrb.exe 2212 qwjhzkqyzg.exe 1648 mlljmzrddqcrb.exe 2148 tbgkhqzx.exe 2148 tbgkhqzx.exe 2148 tbgkhqzx.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 3432 nlvrbdhjuqrjzhv.exe 3432 nlvrbdhjuqrjzhv.exe 3432 nlvrbdhjuqrjzhv.exe 4692 tbgkhqzx.exe 4692 tbgkhqzx.exe 4692 tbgkhqzx.exe 2212 qwjhzkqyzg.exe 1648 mlljmzrddqcrb.exe 2212 qwjhzkqyzg.exe 1648 mlljmzrddqcrb.exe 2212 qwjhzkqyzg.exe 1648 mlljmzrddqcrb.exe 2148 tbgkhqzx.exe 2148 tbgkhqzx.exe 2148 tbgkhqzx.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 5040 WINWORD.EXE 5040 WINWORD.EXE 5040 WINWORD.EXE 5040 WINWORD.EXE 5040 WINWORD.EXE 5040 WINWORD.EXE 5040 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3892 wrote to memory of 2212 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 84 PID 3892 wrote to memory of 2212 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 84 PID 3892 wrote to memory of 2212 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 84 PID 3892 wrote to memory of 3432 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 85 PID 3892 wrote to memory of 3432 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 85 PID 3892 wrote to memory of 3432 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 85 PID 3892 wrote to memory of 4692 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 86 PID 3892 wrote to memory of 4692 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 86 PID 3892 wrote to memory of 4692 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 86 PID 3892 wrote to memory of 1648 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 87 PID 3892 wrote to memory of 1648 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 87 PID 3892 wrote to memory of 1648 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 87 PID 3892 wrote to memory of 5040 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 88 PID 3892 wrote to memory of 5040 3892 e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe 88 PID 2212 wrote to memory of 2148 2212 qwjhzkqyzg.exe 90 PID 2212 wrote to memory of 2148 2212 qwjhzkqyzg.exe 90 PID 2212 wrote to memory of 2148 2212 qwjhzkqyzg.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1e2a51f4bed9b584bccb521b199bac8_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\qwjhzkqyzg.exeqwjhzkqyzg.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\tbgkhqzx.exeC:\Windows\system32\tbgkhqzx.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2148
-
-
-
C:\Windows\SysWOW64\nlvrbdhjuqrjzhv.exenlvrbdhjuqrjzhv.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3432
-
-
C:\Windows\SysWOW64\tbgkhqzx.exetbgkhqzx.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4692
-
-
C:\Windows\SysWOW64\mlljmzrddqcrb.exemlljmzrddqcrb.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1648
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5040
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5d04501e189da768a78efc56139a365fb
SHA1b706471b893f7838d01369d69dfe0438833309a9
SHA25699b5276c1fbb3bba4fd143497b1ff7d254354fa83e30e8e6f49b00d7296acbe1
SHA512469159154fec4e657ea244f770eaa6e493b8a9d8dde90ee2f3efc91c51b286851ec129fe5da9884d5232b2a37744f8fc572075964521ce8b25d1332a7c6bf016
-
Filesize
512KB
MD5d337e6850ad370df06c547f7739b461b
SHA1ad777c21b68362fe91465904d96f750abc50c3f6
SHA256c1c57bddf00d4c6109d234016aef357153f46d86558eb162557c9fa622b87ebd
SHA5121ae959d1c584b20568a0fa0eaf933e0cec69ee016f1e5b7b2fde192547afc74bf62cd190e8300d675999f3f5259bce703d8c052f9810b626d6921309db37762a
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
237B
MD598f405bdd83704bea522267650c8baca
SHA135457a08ed810fbd2ee4b7b57cb06e4e2983c6ff
SHA2563e2ec4bd749637305f314f6614ceb4875d36dd088ad2563749e80e5b85eebe9b
SHA512f89a4aa23d959bc7203c0ad51a7b12435d0989c5d0d6e50fa614a72e8ccacfd46d9acc78aa892fff3ec3c207c9ac8b7a6a0e364e6b2ad7bae0ccec7cb893cb9f
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize674B
MD507d17060b3ae173acc7723025a2b4c20
SHA1f9f6adbf4a2c4e3dd7fff645f855349688f4af62
SHA2565afd33a5655308233bfe55803584448ba8ae854800a1e9eff3d9ab037b4f7e34
SHA512170d56823d3fd121a024ac9e7ba3e647ad192def9faedfaf8619bf6c0ecff26e6024a5f89a23f69d3acab13305dac6603b940b744559b9f484115e14ed75a153
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD5a74d8896925c6c7a432424ff3b0f99fa
SHA14d21b44ccb7e37a11a98e85295fd6422bacd5a01
SHA25655f059787d93a5e9eeb2fb80dcf81967e420afdbf86248e51b11c3959d6bc38d
SHA512d7a73aaf252bba819de3ad885266dccc652f1f1cfc701ac082940983eba65a2ac852168bd5161a85997b58730b7c7d23d2cd38a1f5bfaa5214f72ecc01fc3c4e
-
Filesize
512KB
MD5a9a2f0199009ba3943d4bbba537e574c
SHA117870bea50a4cae7aad3e142ab3c259458fa2f14
SHA256f792753c1f0722523fbeb711d0254ca411d1a5a80818508460f8d486f3d15ca7
SHA512b952cae321341a61a89126113cbf67b6ef5c89e9b2f2a22371a77637dd9444c1838b4d5f581c938652e8e26788de9cf2af24df219e26b6edecea7ff8c51d0e17
-
Filesize
512KB
MD5ef6cfe3bf3b79667215fd25a2520e5f7
SHA1ebf8ce3720ce80730940414d9afd6d3726f48819
SHA256e4ac2c75131de4d47b12f60c6807d580ca565354ea410128940234fb6b4b2c67
SHA5127cbe083b4654f3df1a421b897bbc2fff718e98ae64c2978df797bdeda1c1ad6e4ed23d56313b5b479ef22cd523676b4f74f4ccc27437a40ef39a938db2df7e13
-
Filesize
512KB
MD5892b18cbcdc009986f531fce849e15ad
SHA1ff8e453802dea129c71fff04acc1ea5140ea64a5
SHA256ab12306ead29893aa5de3fcce8f6ada2aa8490d28963a867db2f2bec5bdcae5e
SHA512c0e497e97e83c5841265da5d8c778d65e663fdc6af63fafeca3680e7bf5d1c184610a2317a6f2511b116104e01b5abb04da8197637ae0f0bc5934a84d2abe73e
-
Filesize
512KB
MD542a8f1b3325524b20b5442be02a06df0
SHA19eed8c6b62e701745d689578a2d9dbf2aafd47c3
SHA25604c4615e98a048051940762281d9c4d2c1a5fe0033bb1c5e4e67623f540b63cc
SHA512ea18282617d09bdf92cb6d54469c4b8d690d521eb6951acaa967151a406d39a87629e61cc6a1ee37c795be7595ff7402b605225567c1b53961e6b40e4868641c
-
Filesize
512KB
MD5e51baaa7cd035172f1ae4e3e328212a1
SHA1c92ce75ed89013199b325b270d894149dfad07c8
SHA256e66d12b69c2a304cae79b7aa07e2d4c82c350b7c3fe5ba7f5e8edf2f848ee49e
SHA5120d1591eb6abd8ffe63a7c5aabbd49dd8875fe52b65d8e37c1c330fae7b2887563dc475428c56a594c7bee1deea7059f687a060001aeecab9da0aa6de117a2876
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5ea7957ad34afdcb8804f7068b132783e
SHA13c723bb02b2bee0488e54688957d25a8632c7156
SHA256996bb53b91a0a874f4f8afe07c6b39176c33072da0c4d1b8268cf630b51e3324
SHA51228b1deb325246c5cb24e9d31dec2697e817aeb6c1ba1fab55c8c5b2b83a962dbfa30b3a74951a93a64e50b660812bd7bb2569198fcd42e15e5990a4db0d72368
-
Filesize
512KB
MD5c58acfd12386943f5e5a48cc47fa5f2e
SHA168e02a5034e94c6835ce571b02c4993555bd370f
SHA256eb76a7cd5d48d2179ed229453c09ff45ebee6db711a8872380364dc1d931f610
SHA5121421432f7890340bb5de085ebb5a6936335a74e5fffbcaf629a9c5c254d72f58b253df34d7d57e4dc03cc4ab996e5bbf353a2d445466cdc9ca1fb37d082ba199