Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 03:08
Static task
static1
Behavioral task
behavioral1
Sample
246cbce0d0a13450bb771418f0cf3061_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
246cbce0d0a13450bb771418f0cf3061_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
246cbce0d0a13450bb771418f0cf3061_JaffaCakes118.exe
-
Size
192KB
-
MD5
246cbce0d0a13450bb771418f0cf3061
-
SHA1
07e19b5e4ef89872134d731a6ea8f31fcb24b7ea
-
SHA256
ae199db7bdc96b9a013e948c60811ee94dbb3d5184ecda613e2c340ece7a17a6
-
SHA512
a0ae20d18c33fa44a9508ccd83d323072eef992fed7e1c5de9548ded6860ff706f2ca0807a2da495b904dc8d70e5499043d0fdebf894e137e613ecda45fa135f
-
SSDEEP
1536:RDcP2OaLaaaaat031AdQWB5kCFrWszRUOHFlQhzyLwVKftfVBiZHAPloFp5A2mbP:rOaW3kCFrWsF2eLbqx2994sUxq
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 246cbce0d0a13450bb771418f0cf3061_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bkquuq.exe -
Executes dropped EXE 1 IoCs
pid Process 1624 bkquuq.exe -
Loads dropped DLL 2 IoCs
pid Process 2392 246cbce0d0a13450bb771418f0cf3061_JaffaCakes118.exe 2392 246cbce0d0a13450bb771418f0cf3061_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /w" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /n" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /d" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /c" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /s" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /u" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /a" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /g" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /j" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /b" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /f" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /r" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /h" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /t" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /q" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /m" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /i" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /z" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /o" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /v" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /y" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /k" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /l" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /l" 246cbce0d0a13450bb771418f0cf3061_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /x" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /p" bkquuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkquuq = "C:\\Users\\Admin\\bkquuq.exe /e" bkquuq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2392 246cbce0d0a13450bb771418f0cf3061_JaffaCakes118.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe 1624 bkquuq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2392 246cbce0d0a13450bb771418f0cf3061_JaffaCakes118.exe 1624 bkquuq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1624 2392 246cbce0d0a13450bb771418f0cf3061_JaffaCakes118.exe 28 PID 2392 wrote to memory of 1624 2392 246cbce0d0a13450bb771418f0cf3061_JaffaCakes118.exe 28 PID 2392 wrote to memory of 1624 2392 246cbce0d0a13450bb771418f0cf3061_JaffaCakes118.exe 28 PID 2392 wrote to memory of 1624 2392 246cbce0d0a13450bb771418f0cf3061_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\246cbce0d0a13450bb771418f0cf3061_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\246cbce0d0a13450bb771418f0cf3061_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\bkquuq.exe"C:\Users\Admin\bkquuq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5ab2918fc2ee3fa1540f01f05afca0cca
SHA1e62d942589583349b27d740b468a90cec45ebb1d
SHA25690da7dd1002dec8326ee0ca741f2cbc0bd3d2b497782b7adf9917cc3ccdd63b2
SHA5121c24311fd1d26ac453c32f580d5ab789172780a14f5e1912c87240a37fd64de33e91af5065b70cb3f22954caa76baad4f638c452f3cb4110966f238c7cbd267a