Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 16:28
Static task
static1
Behavioral task
behavioral1
Sample
0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe
-
Size
272KB
-
MD5
0ec024243a3918640ea5391448ba6931
-
SHA1
9c4464ab0a3f5548378dd62eb149a0852f2843be
-
SHA256
3065a73dc9c51a8771e00c32687d2e8d82b96b7a64ba4c542bd1b5aea03bb536
-
SHA512
81898d2c4b890460dbe3dd90e95bf67dbdb132c3d35aa2b16000099643632c7ed34ee0a547690c7d854b381052126fe3b5e2d0a7899ac5ce570ac06033e18d70
-
SSDEEP
6144:J00geEaFb79FR1eTboMMnIroSe5Kvf8QLBBzAM+GuN8QpKPig:J00geEaF1L5tSeMlLbzL+jkf
Malware Config
Signatures
-
Gh0st RAT payload 6 IoCs
resource yara_rule behavioral1/memory/3056-7-0x0000000000400000-0x0000000000479000-memory.dmp family_gh0strat behavioral1/files/0x002a000000016c5d-19.dat family_gh0strat behavioral1/memory/2332-27-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral1/memory/2332-26-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral1/memory/3056-28-0x0000000000400000-0x0000000000479000-memory.dmp family_gh0strat behavioral1/memory/3056-44-0x0000000000400000-0x0000000000479000-memory.dmp family_gh0strat -
Deletes itself 1 IoCs
pid Process 2804 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2332 qiuqi0.exe 2268 qiuqi0.exe -
Loads dropped DLL 11 IoCs
pid Process 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 2332 qiuqi0.exe 2332 qiuqi0.exe 2332 qiuqi0.exe 2332 qiuqi0.exe 2332 qiuqi0.exe 2332 qiuqi0.exe 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 2268 qiuqi0.exe 2268 qiuqi0.exe 2268 qiuqi0.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 qiuqi0.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Common Files\qiuqi0.bat 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe File created C:\Program Files\Common Files\maoma0.dll 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe File created C:\Program Files\Common Files\qiuqi0.dll 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe File created C:\Program Files\Common Files\qiuqi0.exe 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\qiuqi0.exe 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 qiuqi0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz qiuqi0.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{603D3801-BD81-11d0-A3A5-00C04FD706EC}\InProcServer32 qiuqi0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID qiuqi0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{603D3801-BD81-11d0-A3A5-00C04FD706EC} qiuqi0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2332 qiuqi0.exe 2332 qiuqi0.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2332 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 28 PID 3056 wrote to memory of 2332 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 28 PID 3056 wrote to memory of 2332 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 28 PID 3056 wrote to memory of 2332 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 28 PID 3056 wrote to memory of 2332 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 28 PID 3056 wrote to memory of 2332 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 28 PID 3056 wrote to memory of 2332 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 28 PID 3056 wrote to memory of 2268 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2268 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2268 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2268 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2268 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2268 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2268 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 29 PID 2268 wrote to memory of 2676 2268 qiuqi0.exe 30 PID 2268 wrote to memory of 2676 2268 qiuqi0.exe 30 PID 2268 wrote to memory of 2676 2268 qiuqi0.exe 30 PID 2268 wrote to memory of 2676 2268 qiuqi0.exe 30 PID 2268 wrote to memory of 2676 2268 qiuqi0.exe 30 PID 2268 wrote to memory of 2676 2268 qiuqi0.exe 30 PID 2268 wrote to memory of 2676 2268 qiuqi0.exe 30 PID 3056 wrote to memory of 2804 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2804 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2804 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2804 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2804 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2804 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2804 3056 0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0ec024243a3918640ea5391448ba6931_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files\Common Files\qiuqi0.exe"C:\Program Files\Common Files\qiuqi0.exe" "C:\Program Files\Common Files\maoma0.dll" ServiceMain2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Documents and Settings\qiuqi0.exe"C:\Documents and Settings\qiuqi0.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\cmd.execmd /c del C:\DOCUME~1\qiuqi0.exe3⤵PID:2676
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del C:\Users\Admin\AppData\Local\Temp\0EC024~1.EXE2⤵
- Deletes itself
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24.1MB
MD5753459e40f44371c104eff19a6f15fc9
SHA1a3398c8c937371c7fa8b2bb60d0c9afa1468c5bd
SHA256ddd716d15a05ba358d74fe002fff6fae5eddb8ce40494993d264d78cf78991dd
SHA5120763040b76a3b484df738582e1dbb359a29d8efe3cd6b23f8d486f97083c35fe4e686125bb2099d08f5a9b508a1bc51be6b607fc695936a7525f61c697e5e33b
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
24.0MB
MD595d2a40087b803f804ff4a63b039c606
SHA1e6924bff1eb1e980a5c30d700ff936b33275526e
SHA256fa99b882eabbd653d85279d48c806d5dc7ebf27988eaa3efd291530c2334d884
SHA5121ba688eac41eecfa2211d408003d8551eb1ba524d43b1cd49552eff4374bb3a4c6fbffe2f7ff805efde58a30b6cb2ca9d2d4bfe6ac84e79e709a1128d39908a4