Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 22:47

General

  • Target

    ee93a50df5c496640d8e0943f5efc2ce_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    ee93a50df5c496640d8e0943f5efc2ce

  • SHA1

    2e666ba4c55d23b077c5c307ff5f7c51ee7039a8

  • SHA256

    c5a2b0d2b91620edfb58e777c9e7dcf44b11e8347a822ee3c659fdf81b318077

  • SHA512

    e217e6490554b18141cfabbd7939064eff706c315d06e0af7e9d1aa92745d1b576ce1382c1f30e5674a3fcf4c7bae855957e81923397a837fe529b1b618772d5

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6K:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5R

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee93a50df5c496640d8e0943f5efc2ce_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ee93a50df5c496640d8e0943f5efc2ce_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3224
    • C:\Windows\SysWOW64\tsyzeztzbw.exe
      tsyzeztzbw.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Windows\SysWOW64\xbzazihz.exe
        C:\Windows\system32\xbzazihz.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4896
    • C:\Windows\SysWOW64\etoprslfhjrwtlj.exe
      etoprslfhjrwtlj.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4992
    • C:\Windows\SysWOW64\xbzazihz.exe
      xbzazihz.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4996
    • C:\Windows\SysWOW64\takkhchqmqgmr.exe
      takkhchqmqgmr.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1400
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    a40d768732834b1baf6495a2474e5f50

    SHA1

    719fb43ef7844698f30dfc7c877b9da6f68046c9

    SHA256

    e5a376043ce60d5d142040e09c5c4cad95a6a38b1c11176b8b53566251dda064

    SHA512

    4b0bb458349d271d0ed8d0e6f3ca8fa781a7e59d5c755771723333450c95b7ab9517c85009d8ba9322e2a3b4de56770b3e1ee68880c99ab85fe6781244900932

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    6f42d125ae174dfab6e7b54ae22e8a8d

    SHA1

    35077a54ec6052f13bfe084b36d0d5080d848658

    SHA256

    814bb60e7a82e66fefd8ebdece48538fb4bcbc0a25075681d6df1c044c1b8647

    SHA512

    9a69cdb485d56ae87411a8574fa80e976854ff781fd5c593ec3a3809b5c969cf8cfc77fa1c1ad88a64a090fb0551d8b634d97b10ec83513b314d4e4e4049437a

  • C:\Users\Admin\AppData\Local\Temp\TCDB3FC.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    295B

    MD5

    c8c7f72302e1a07f8ef6682e22b550d6

    SHA1

    b0d240036e25ba0d0651cfea5750690dd699987d

    SHA256

    0708ee25df8ed2983ac2e37cf2c9122278c74a2cc271d926229e59be874c16fa

    SHA512

    db63ab2e300d70ee662f495fa7663800ea62e42743a0a24a7da58acc160362f3766cfbab9792024567bdba48dd1dc22b6f1afe46c626194934ba9941a3c569ce

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    18309c227a19453a7b05d91710cfa7b0

    SHA1

    daf56cad0bfedd4d4da46f5935ee42368d4fe089

    SHA256

    64e9ed93a96105b6330d1aecef7564410c3a49a64dbaf286aacdffa60b640ba9

    SHA512

    2be525fbcb562a5605e07a3d7b93dabb769444627fab02dad09b8ff7bea620fce91740a0381d0cadd9f768b91028bceb07a49477574d536e4ab1f36481702681

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    2KB

    MD5

    317803e994dddc0cbdd62fba89ba0ed0

    SHA1

    91aed044246d836b39c52c59337042cf01f0f974

    SHA256

    3cef172a7dda8bf0aa693f3174d6ad0f336c8939652766d640eb4f757623bbf6

    SHA512

    16c9865cf80d913fd93131ab742d9cd7aa657e6c0c42f3870da6bc0353eca347e64aaf60604db45e99460eb9462dbd9802131b338c427e149a4b48a924935607

  • C:\Windows\SysWOW64\etoprslfhjrwtlj.exe

    Filesize

    512KB

    MD5

    a0cb4d0c5c003272e8c58c4e7580f01c

    SHA1

    429d9b7291eba112e63521e620322832807ef04e

    SHA256

    025d75e708cf74241c722b0229c85f16373d5c392a948126cbcac0eb6098e50f

    SHA512

    0bcfa0e0d5549f2d65bde0c9f588b42f5c5c7816fbd372219f959d71aaaef3c517172636562042cd6d6f50c29fc5cc6a260cdb171150c6e95ba7855f203a0879

  • C:\Windows\SysWOW64\takkhchqmqgmr.exe

    Filesize

    512KB

    MD5

    12fbfc83df548efc4b8dbd24ab55885b

    SHA1

    c3cae485461fd12e15a06bfdd0a01a27752a873a

    SHA256

    1b98d677091cf438a54bbbdfd139a3d1e5c5cbaa67fde9b24dfbeca4d1a118f9

    SHA512

    f9c39dff897e5625da19e6abf37e983f30f81a5c10c4f4daffe6688507c9171d87d2e4af76c67040f63efbe2a329c45d69c15c6578171bf6205de7b905a5a7c0

  • C:\Windows\SysWOW64\tsyzeztzbw.exe

    Filesize

    512KB

    MD5

    7ed3d9b77c1f1475b67a73a2db404a44

    SHA1

    07ec1372aad74c271860c1a0e624df8d48c9ea10

    SHA256

    1ded76b288072ca1ef58dde357d48a5db70253feb098d9e67e281cbe9ae47977

    SHA512

    2206e1638a0f27c016ddfc71dc9f5c6395f2a73b065bb211c114db220252107d308c2bccf329cceedc3e8eecfc131c5522be701e8b8c3b611054028a86bc32e2

  • C:\Windows\SysWOW64\xbzazihz.exe

    Filesize

    512KB

    MD5

    ec8ee11b5abf9c5cef77cd5243a8806a

    SHA1

    aae9f19b3547768e43423fcac9d691cfae3be5c4

    SHA256

    82ee5a0be1c74463ca70b31155b6f1cf52f1ede3a786b681d86c0fc6ad91af72

    SHA512

    06767d66bd7a7e72e3d21cc9bae7e17b2d9f2d46243cef48fb67223f4395143bf10ffe324d54e2a55d72d76b4c21854d5af753e56dddf720eb405ca3cf8a2522

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    616d823ceccd35314a6b6271796a9e33

    SHA1

    447af4f86b43a2094b16a72567b5b89aebfb4dae

    SHA256

    6613d5d74c691f46a79e90368b241bb41ebde9840c1afc889d6594e338d6268b

    SHA512

    05fccb0fb5ffe2b17d63b752e8d8b4e3e70a8043bad4cde809f1804d5df5227f74b5effb527a8228c8445a6030ebff65e733de3a9c6d4d3ae69b34977272f0b4

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    8c4f90589349b12587d500b7c6f4f1e4

    SHA1

    5144b06e3ce76cc56aff83e3bc4a98aa10451e52

    SHA256

    309621cae884025ea47b30d77c3a24ea1d284518be9b10a3125f653aaa87b2c2

    SHA512

    7a8ab22d3d850baa7be14d34ed05db0eee2a7ab0de42585d02d8c4667197fda03c49f1a2c4f9d77cd7cd3db20cc34180e57b7833438aa2d44dd745d0397122e6

  • memory/3224-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/3836-40-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

    Filesize

    64KB

  • memory/3836-43-0x00007FFE4C540000-0x00007FFE4C550000-memory.dmp

    Filesize

    64KB

  • memory/3836-38-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

    Filesize

    64KB

  • memory/3836-39-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

    Filesize

    64KB

  • memory/3836-41-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

    Filesize

    64KB

  • memory/3836-37-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

    Filesize

    64KB

  • memory/3836-42-0x00007FFE4C540000-0x00007FFE4C550000-memory.dmp

    Filesize

    64KB

  • memory/3836-593-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

    Filesize

    64KB

  • memory/3836-595-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

    Filesize

    64KB

  • memory/3836-596-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

    Filesize

    64KB

  • memory/3836-594-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

    Filesize

    64KB