Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 23:28

General

  • Target

    eea3ff7a3533c37bb102a18ae801d651_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    eea3ff7a3533c37bb102a18ae801d651

  • SHA1

    cd34b8cf0cc866cfd702bca069ae03782f7390e9

  • SHA256

    124eb5af22ea3cd9780ab256cfaa916c999a232ec49a31aae5c88fa0d889694c

  • SHA512

    14654258f230de1a13f37d1f8c02eeda3a58a6800ab5983093938b8d38c3e869cede1d662779080204cf634e58dc766c76d0d4663d93f4e4a6c04b07a5374ff3

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj68:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm55

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 19 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eea3ff7a3533c37bb102a18ae801d651_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eea3ff7a3533c37bb102a18ae801d651_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Windows\SysWOW64\pfdyswgpsg.exe
      pfdyswgpsg.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\SysWOW64\xdoleoze.exe
        C:\Windows\system32\xdoleoze.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2624
    • C:\Windows\SysWOW64\vwtyckcahqmcvdl.exe
      vwtyckcahqmcvdl.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2756
    • C:\Windows\SysWOW64\xdoleoze.exe
      xdoleoze.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2764
    • C:\Windows\SysWOW64\raqrreeqaguzf.exe
      raqrreeqaguzf.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2760
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1320

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      b428c11240a2f519301e5f4f5c057c77

      SHA1

      4b95c97d0b7d43dcb35c021628cb44aa20ff2270

      SHA256

      aa5980d5ab787e1d31ca358f00289c55276e553cd36e83538fc5917e77d4e171

      SHA512

      0d70e26b62b8df1c50253f4e1102f73ad472e459a7c7f6a3e7a85e1cb95e6c395970f3996fb7df03b1091d20ecaaf369660cb9c2397d42009b6c6667cc477a69

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      764b41e8ac43d06387ec928ef3d8b1f2

      SHA1

      9506f383070dc7fe2197c44c306ebdd6daf22157

      SHA256

      7c04b4880d510351ec8213178cf97e3d043a7f777318c716a5b1b672c4e57928

      SHA512

      e589d933f02248cb8c3fc1e172ad5af5a8cbd27cc98aea7db9f0e0526ed4599782b1f6cd7db44427f7d9377eb1538bd719842c860db262c6ecab2444583d1cc5

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      cfc1f523d4b306a37f9969750048f5c4

      SHA1

      abe3e57df37eadb68be08ef2859b5d89ff49be3a

      SHA256

      ecce54e4c01ef2185c67e5fad668703e97ac8f23f0cbc54b0dfddb2b1097de04

      SHA512

      97ec992036ddae079f737d7d6fa951ee0a43f0b3e3d77ecb420131607a133453a746d4879170bc5bc6e95bc3875d0bfb57de786dd3562e6e6ddb9c66d9cf3857

    • C:\Windows\SysWOW64\raqrreeqaguzf.exe

      Filesize

      512KB

      MD5

      577defb265699b63843dfa943b774aa0

      SHA1

      9e062dd884b01f8fd2eb5e0ad9a9be568cc3d384

      SHA256

      91ae37e507757fe85e2abe14e6f965096200b0eec348d06fb0bf89c96fba15b2

      SHA512

      ef76ac1fc5b2349db2e25d0e891ba9743261d853caab8339d290d09d6ba03379fffc11cf7683c6024f1f3e892757df8d66d3bb962d51ce1aca6c85d7c7ec237d

    • C:\Windows\SysWOW64\vwtyckcahqmcvdl.exe

      Filesize

      512KB

      MD5

      79a4a0d11db247f1723cac1a123bfbe1

      SHA1

      ac10a155a8b5af2b186d708353b783e6b2d85974

      SHA256

      ad96c877da2b626ccfd3aac0a38015a37d5346227c2ddd00773d5a0981e3347c

      SHA512

      055063cf5187fea1d815df0397d12f16cac66d42472dc30a12c609bc6a95b02ab2530f37e735cfb29ec28fc7bfb6123fdc4b279f6a350d163aca185f25ba65db

    • C:\Windows\SysWOW64\xdoleoze.exe

      Filesize

      512KB

      MD5

      2d58693bf88acdeeda5240d6ea7da56f

      SHA1

      ff6d82c52e418738ea5f4cdb5cc2836fedc9dbd8

      SHA256

      1dea8e40d542601a4e60729cc8b526ea7d43806b411336db520fdb3059636cda

      SHA512

      64e8d92a7bf48d73fbb1c7ad8e950193cd496561e21fe1f7b86e03b93c48adc2b677dc22d1bcab8ef708c400ee38c0333f04c3a2edfebb20c0a4378c948f6ba8

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\pfdyswgpsg.exe

      Filesize

      512KB

      MD5

      b6eafad6ac2475fd3421c979be087d01

      SHA1

      9db693b35a18faf09904c05bc1ffd6f998932a2e

      SHA256

      21918d4ed883f3cdf2818ec17c5dc89761a1a08ae0ef8b9e9163bbc4b4a1dc84

      SHA512

      5144ecaef006226ec90d4187b6d6d27cb9e5d9a800cae9c1fc60b01c256b1c16a8d3dc9dc834e38363e841df86e4e2cdc90b304a71fd3a251e80345cf3cc108b

    • memory/2308-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/3036-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3036-93-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB