Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 22:08

General

  • Target

    ee849dcee1607b4e7a2f1c69f2ff547b_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    ee849dcee1607b4e7a2f1c69f2ff547b

  • SHA1

    ea661a9c9b1b50698574b21829690f3622ba3649

  • SHA256

    62307422f67e2c10ea5621efabfa761d2bc32bcf8e03ba7ad4100b1231bd9aa7

  • SHA512

    3efe7d24280c0e8e390278da707dad635c562c3ac322bcaefabff42641b968db242aafd689b453134dedc4a1b2dacd5a282d2cbb436487ed44236208aca00262

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6G:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm57

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee849dcee1607b4e7a2f1c69f2ff547b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ee849dcee1607b4e7a2f1c69f2ff547b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4988
    • C:\Windows\SysWOW64\rzuerpeabb.exe
      rzuerpeabb.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:552
      • C:\Windows\SysWOW64\nbbdsxlx.exe
        C:\Windows\system32\nbbdsxlx.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4384
    • C:\Windows\SysWOW64\ryrnstqgbmouhis.exe
      ryrnstqgbmouhis.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4192
    • C:\Windows\SysWOW64\nbbdsxlx.exe
      nbbdsxlx.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4296
    • C:\Windows\SysWOW64\ydnuhwdxepckc.exe
      ydnuhwdxepckc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:668
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    56a24bf7afbd1ab247f86f5063ef1611

    SHA1

    3eb0a1482c5ef5bdc6eea0698d482d0c5821c263

    SHA256

    b94e3a4b39d7e10e0d63b70e0f22b0dcb87d4651c41cba9692265a7481181999

    SHA512

    6a2f4fd424b0a1aeb50f33843871e118d691322b3db75a210476f1ad6784b921c0d78a22da8ee21afae1d99452e1aba434c3bd1ec5a0ea40f1022f092ca2d7f7

  • C:\Users\Admin\AppData\Local\Temp\TCDC40D.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    297B

    MD5

    2ff4c90cf86dddf1bcc83013c246ac63

    SHA1

    96f0826306e83a41a69e281020d198ebaca5d94e

    SHA256

    f43dd41d1fb87826dc0f53b5011caadc5f6668bec5890815c18a16c591f73199

    SHA512

    287735c8b5d58a3bd33ba53037fa22d6e049ce3d85aa7a03f7069ea88518da500ee34bb88e8acdc9357cfef8642a338da4629f4bcde172d5f165c5d96ac765e7

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    16B

    MD5

    d29962abc88624befc0135579ae485ec

    SHA1

    e40a6458296ec6a2427bcb280572d023a9862b31

    SHA256

    a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

    SHA512

    4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    674B

    MD5

    571309a7e9d7b50de6052230f779ec1c

    SHA1

    a80f6d0603458178d5dabe89f8a14e7f26eb353c

    SHA256

    c990b4b1058d1b69fb17bf77c3d3d6ea57a1c7e150c126a5b84d5ecbe98d41e8

    SHA512

    2c46660cc18a09fa7d44519a668e8078cfbcd6d9f65e4540e364ac4644bc26dcc8ca828a40b2de9d123d6a4ac5dbd6645df24b03b30db487734b14a1fffe6e44

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    e78f1621c66615ac84cb0914721be327

    SHA1

    f775d2f9aa9aa2f095165f13c292d9e7039e8260

    SHA256

    2df92d46d5931fb57a58b46f254b4d67901c65ecb6d4a3a3f4ab869f2f906b8d

    SHA512

    255da2045609ece09fbbfd22d6b4074ca4a5cc442e5ad26d28fafef88b6e9e2c56a379e0b085fc2743e875d9c2bccd344f3e5ed7bf8cd258fe75b91bcb297f47

  • C:\Windows\SysWOW64\nbbdsxlx.exe

    Filesize

    512KB

    MD5

    8a3aab787725b667f4a94fcee5e5818b

    SHA1

    71934a6563aa956d16813b112963352460958b40

    SHA256

    37eee3141f2a60a0575d00d91bcfee28f7f847e053df45de4f536a80e6207c1c

    SHA512

    02a0a8f4f78e098f8aee15c580b7f304075d42e9f86c0ed0436fb4881f29e358206d1cc86c655519ccf5999e6ffcefb7bfabc064579bc0dd19eeeae01e1cca58

  • C:\Windows\SysWOW64\ryrnstqgbmouhis.exe

    Filesize

    512KB

    MD5

    b3ba56340005a016e4899d6c92e8dd6f

    SHA1

    a31a7a72d50dbc817dff4cdd5759066e83f95ccf

    SHA256

    60922dd5e69c9ea247406f357403dd83582473bf536c013b713a4c9e0aeb21aa

    SHA512

    f786034b9cf92e2397b222749e2ae26ab104ce650d1834ba6a4b2879cbb35855da04009d6bd9e833246e5ab0ed91a4ef61e792f68ddd3187b1ded342e6b0dd3a

  • C:\Windows\SysWOW64\rzuerpeabb.exe

    Filesize

    512KB

    MD5

    495cf3480fb3c60606b0993ee9c1f341

    SHA1

    f0d53e5df8590dea092f3b6f2d5b95eb56ed32f0

    SHA256

    c488f3d26306870fe551107f67227aaa0bff7b6a3bbe23237712eed7ff0119ae

    SHA512

    9754469a99f6036accc1080411ee7be2747efa99a8eb73e495abf29c8b0a67609144c5642590367fe7184c28f68133af4b606128efc2a9185b7110793fb33e74

  • C:\Windows\SysWOW64\ydnuhwdxepckc.exe

    Filesize

    512KB

    MD5

    efd67dc4d344bfb368adfec3dc82628e

    SHA1

    7dd492a70f815b52d54e2d56f106c43b7d5ac3a7

    SHA256

    59a99020e3660d2a40831820a6f211287eed819fc41c20302e0ae66ca5be9d54

    SHA512

    186176a732e92d5ee5add2a9da3c6565aed5faf716e305b07a91358420b152e7df0a0ea567fe03671bc68648db5a08078014cdf7b3db1e80a148ac22caabaad7

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    5b00cb317588e5c633f5b175b97bfc74

    SHA1

    4f2b45887692e7d8176ff445308c07cf04fa9ddd

    SHA256

    c3686634177d3013b5d43529c971f9ce2628263c4361147c2fb261eb8c7d89d7

    SHA512

    d1c6a19856796c4ce85d3dd5de028ac38f5b30959458da731296d5b3590e50a61dc0debf5c6556a2a3afea0953d1fd9587fb5c9151b5df17ca4495c955ad75b2

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    790c46c633c234c1a07519685d562a5e

    SHA1

    99fad99d44d3ce60ce7d67b2fcbde2f5307379c7

    SHA256

    c0f25774e1f325b5ec46da622bcc7e90c77cbf526187a2127c78c1b369819d3f

    SHA512

    c9dd1a4425f26f3849e0042c2247e166cf1c896b5565429e6036953fb0c208b7ee70211aa646c3e7ce2bbaa7b8e7780dcb5df030d4dc3fd3dd3d301ccf6e04e1

  • memory/1200-43-0x00007FFCB0390000-0x00007FFCB03A0000-memory.dmp

    Filesize

    64KB

  • memory/1200-42-0x00007FFCB0390000-0x00007FFCB03A0000-memory.dmp

    Filesize

    64KB

  • memory/1200-41-0x00007FFCB2CF0000-0x00007FFCB2D00000-memory.dmp

    Filesize

    64KB

  • memory/1200-40-0x00007FFCB2CF0000-0x00007FFCB2D00000-memory.dmp

    Filesize

    64KB

  • memory/1200-39-0x00007FFCB2CF0000-0x00007FFCB2D00000-memory.dmp

    Filesize

    64KB

  • memory/1200-38-0x00007FFCB2CF0000-0x00007FFCB2D00000-memory.dmp

    Filesize

    64KB

  • memory/1200-37-0x00007FFCB2CF0000-0x00007FFCB2D00000-memory.dmp

    Filesize

    64KB

  • memory/1200-603-0x00007FFCB2CF0000-0x00007FFCB2D00000-memory.dmp

    Filesize

    64KB

  • memory/1200-605-0x00007FFCB2CF0000-0x00007FFCB2D00000-memory.dmp

    Filesize

    64KB

  • memory/1200-604-0x00007FFCB2CF0000-0x00007FFCB2D00000-memory.dmp

    Filesize

    64KB

  • memory/1200-602-0x00007FFCB2CF0000-0x00007FFCB2D00000-memory.dmp

    Filesize

    64KB

  • memory/4988-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB