Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe
-
Size
526KB
-
MD5
4c534640c1640866fb3f340b7f2f097b
-
SHA1
87335d6780313da3243963768c56a1d57da4ffba
-
SHA256
74f7681392fa6d1d6c62467d8a9b3ab60df26820ce60fad04585b7cb68d444b1
-
SHA512
7b66b294999d9266a476e40e0b263197a499207a7d82c7cf22b1ad55bf458a281dc967b273255665f2232c4698365ac483735412bd7248ecc8c8e17a543e3ab5
-
SSDEEP
12288:FVpo70X4yQySH6u40Prkl84/0zGoPqLbI16MMcxwireV:F3+0Xh46N+2czaPE6MHxw7
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe qvodplay7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "services.exe" qvodplay7.exe -
Executes dropped EXE 3 IoCs
pid Process 2896 QvodSetup5.exe 2484 qvodplay7.exe 2740 ~25946532.exe -
Loads dropped DLL 8 IoCs
pid Process 3020 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 3020 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 3020 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 2896 QvodSetup5.exe 2896 QvodSetup5.exe 2896 QvodSetup5.exe 2484 qvodplay7.exe 2484 qvodplay7.exe -
resource yara_rule behavioral1/files/0x000a000000016d6e-17.dat upx behavioral1/files/0x000b0000000122f7-8.dat upx behavioral1/memory/2484-20-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2896-19-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral1/memory/2484-32-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2896-31-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral1/memory/2896-37-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral1/memory/2484-38-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2484-49-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2896-48-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral1/memory/2896-51-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral1/memory/2896-55-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral1/memory/2896-59-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral1/memory/2896-61-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral1/memory/2896-67-0x0000000000400000-0x00000000004E7000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\msconfig = "C:\\Windows\\system32\\ukUf4.exe" qvodplay7.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ukUf4.exe qvodplay7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2484 qvodplay7.exe 2484 qvodplay7.exe 2484 qvodplay7.exe 2484 qvodplay7.exe 2484 qvodplay7.exe 2484 qvodplay7.exe 2484 qvodplay7.exe 2484 qvodplay7.exe 2484 qvodplay7.exe 2484 qvodplay7.exe 2740 ~25946532.exe 2740 ~25946532.exe 2740 ~25946532.exe 2740 ~25946532.exe 2740 ~25946532.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2484 qvodplay7.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2896 QvodSetup5.exe 2896 QvodSetup5.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2896 QvodSetup5.exe 2896 QvodSetup5.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2896 3020 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2896 3020 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2896 3020 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2896 3020 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2896 3020 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2896 3020 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2896 3020 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2484 3020 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 32 PID 3020 wrote to memory of 2484 3020 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 32 PID 3020 wrote to memory of 2484 3020 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 32 PID 3020 wrote to memory of 2484 3020 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 32 PID 2484 wrote to memory of 2740 2484 qvodplay7.exe 33 PID 2484 wrote to memory of 2740 2484 qvodplay7.exe 33 PID 2484 wrote to memory of 2740 2484 qvodplay7.exe 33 PID 2484 wrote to memory of 2740 2484 qvodplay7.exe 33 PID 2740 wrote to memory of 1200 2740 ~25946532.exe 34 PID 2740 wrote to memory of 1200 2740 ~25946532.exe 34 PID 2740 wrote to memory of 1200 2740 ~25946532.exe 34 PID 2740 wrote to memory of 1200 2740 ~25946532.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\QvodSetup5.exe"C:\Users\Admin\AppData\Local\Temp\QvodSetup5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\qvodplay7.exe"C:\Users\Admin\AppData\Local\Temp\qvodplay7.exe"2⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\~25946532.exeC:\Users\Admin\AppData\Local\Temp\~25946532.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\cmd.execmd4⤵PID:1200
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD559e20e2ec60d5946ad54b64a3deb1c83
SHA17027c9308b7b2d14ff9fd7b81efa81a1c9a0ec68
SHA256538c299746b0afa502968f74f13220069a204e06d008c429a19762ee7ae097bc
SHA512283824f4d63fdef8eba6a078dc7dcaff401cc13aee6e3c970f0505772b4b1525e2ad805dc2e90b3140f3d9523ea7db575eaf860db60f6c2b4a8edb289d447aa9
-
Filesize
29KB
MD51a3440da9f8f5cad3319d8b2e17772be
SHA1fb3c6ec93d7d15228f77d71651a8f24a1a35facf
SHA25609c7ece20c9b50b0d272cc40c45a965d289a9ae73441a0b893de3c9532aeeae3
SHA512b22e08e4fc4a4acb760a3d56992b9d73f1ccb5ac2eaff04f66587b55b3a3396f3760840c50e7800f1e51cd95ef95f6d70a41e6c3766ed60cb41ada85920c5e23
-
Filesize
8KB
MD51c85b838536b8027027ed9a9019f6e57
SHA1193086e31000ad275b91798e6ab2bf1823f28fb7
SHA256513684483d92bef7b9ea5f279b47cededbfa059bd7688f0944cd9c3e0a7c4c3c
SHA5127fa2da850652713edc6e187d0014f12ae877d8f6699160a4e0b1ed6d8163279316ace4d81373ee98f22a7f5b816f81a531af1a23c0e9ebb35546e9f8e0d9e25c