Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
70b456d5ab3...18.exe
windows7-x64
10b456d5ab3...18.exe
windows10-2004-x64
1$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3QQTMAC06SF.exe
windows7-x64
6QQTMAC06SF.exe
windows10-2004-x64
1Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7hook.dll
windows7-x64
1hook.dll
windows10-2004-x64
1Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 23:31
Behavioral task
behavioral1
Sample
0b456d5ab382efe1110d034c75846a41_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0b456d5ab382efe1110d034c75846a41_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
QQTMAC06SF.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
QQTMAC06SF.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
hook.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
hook.dll
Resource
win10v2004-20240226-en
General
-
Target
QQTMAC06SF.exe
-
Size
595KB
-
MD5
89081778bad68400c754205dddf7f5a4
-
SHA1
cbe76938e67c9f66c22c9f2c250eeec283c62e55
-
SHA256
c23413f734c2f489ca2586a56f297fc40ce80025e1c12d9c419ea303b0981de1
-
SHA512
5434c124cedcdebd0177a2d907a49b4d60d4d7a61a8e5fb11636291a60a4a01f903b5bfa77a240aedaec4805d3014b4a9b77a44a90f1b1904ed585d491d224c2
-
SSDEEP
12288:UbwE9yTJQQgnVtGI7w3gxqPgx6kZ8dsbv9l87z8+rQYR+Mxv8I9:U1cJQdVjwwxhx7Zm/7zVR+kX9
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 QQTMAC06SF.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2884 QQTMAC06SF.exe Token: SeSecurityPrivilege 2884 QQTMAC06SF.exe Token: SeTakeOwnershipPrivilege 2884 QQTMAC06SF.exe Token: SeLoadDriverPrivilege 2884 QQTMAC06SF.exe Token: SeSystemProfilePrivilege 2884 QQTMAC06SF.exe Token: SeSystemtimePrivilege 2884 QQTMAC06SF.exe Token: SeProfSingleProcessPrivilege 2884 QQTMAC06SF.exe Token: SeIncBasePriorityPrivilege 2884 QQTMAC06SF.exe Token: SeCreatePagefilePrivilege 2884 QQTMAC06SF.exe Token: SeShutdownPrivilege 2884 QQTMAC06SF.exe Token: SeDebugPrivilege 2884 QQTMAC06SF.exe Token: SeSystemEnvironmentPrivilege 2884 QQTMAC06SF.exe Token: SeRemoteShutdownPrivilege 2884 QQTMAC06SF.exe Token: SeUndockPrivilege 2884 QQTMAC06SF.exe Token: SeManageVolumePrivilege 2884 QQTMAC06SF.exe Token: 33 2884 QQTMAC06SF.exe Token: 34 2884 QQTMAC06SF.exe Token: 35 2884 QQTMAC06SF.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2884 QQTMAC06SF.exe 2884 QQTMAC06SF.exe 2884 QQTMAC06SF.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2884 QQTMAC06SF.exe 2884 QQTMAC06SF.exe 2884 QQTMAC06SF.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2884 QQTMAC06SF.exe 2884 QQTMAC06SF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\QQTMAC06SF.exe"C:\Users\Admin\AppData\Local\Temp\QQTMAC06SF.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2884