Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 09:59
Static task
static1
Behavioral task
behavioral1
Sample
60058771844545cbf6c53ced634af4a5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
60058771844545cbf6c53ced634af4a5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
60058771844545cbf6c53ced634af4a5_JaffaCakes118.exe
-
Size
166KB
-
MD5
60058771844545cbf6c53ced634af4a5
-
SHA1
91af686df0b426fc78b3f8b34bb9f1f6beec1f31
-
SHA256
c2e41bcb037e2b6acda4700d6c70f1a0fe056e61d277ca39b978c6411d089bc8
-
SHA512
a2d5a3cfa15560b6afa1b6f8eee97477a990502c30b73034f75b543b7e3f6fa816612eae2d187d47d6283f73932cfbdc31be55530ea1c3f2ebc6bcf07a2ce9bb
-
SSDEEP
3072:2DZ8aYdmuZenediG9oSYnQCAkiNswhxIm6Wiy+Ysft8e1s7I:65eeQiuRYnQCpiLI5y+YE8qA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2328 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2900 xqokg.exe -
Loads dropped DLL 4 IoCs
pid Process 2328 cmd.exe 2328 cmd.exe 2900 xqokg.exe 2900 xqokg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2848 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2760 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2900 xqokg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2848 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2900 xqokg.exe 2900 xqokg.exe 2900 xqokg.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2900 xqokg.exe 2900 xqokg.exe 2900 xqokg.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2328 2928 60058771844545cbf6c53ced634af4a5_JaffaCakes118.exe 29 PID 2928 wrote to memory of 2328 2928 60058771844545cbf6c53ced634af4a5_JaffaCakes118.exe 29 PID 2928 wrote to memory of 2328 2928 60058771844545cbf6c53ced634af4a5_JaffaCakes118.exe 29 PID 2928 wrote to memory of 2328 2928 60058771844545cbf6c53ced634af4a5_JaffaCakes118.exe 29 PID 2328 wrote to memory of 2848 2328 cmd.exe 31 PID 2328 wrote to memory of 2848 2328 cmd.exe 31 PID 2328 wrote to memory of 2848 2328 cmd.exe 31 PID 2328 wrote to memory of 2848 2328 cmd.exe 31 PID 2328 wrote to memory of 2760 2328 cmd.exe 33 PID 2328 wrote to memory of 2760 2328 cmd.exe 33 PID 2328 wrote to memory of 2760 2328 cmd.exe 33 PID 2328 wrote to memory of 2760 2328 cmd.exe 33 PID 2328 wrote to memory of 2900 2328 cmd.exe 34 PID 2328 wrote to memory of 2900 2328 cmd.exe 34 PID 2328 wrote to memory of 2900 2328 cmd.exe 34 PID 2328 wrote to memory of 2900 2328 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\60058771844545cbf6c53ced634af4a5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\60058771844545cbf6c53ced634af4a5_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2928 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\60058771844545cbf6c53ced634af4a5_JaffaCakes118.exe" & start C:\Users\Admin\AppData\Local\xqokg.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 29283⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:2760
-
-
C:\Users\Admin\AppData\Local\xqokg.exeC:\Users\Admin\AppData\Local\xqokg.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2900
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166KB
MD560058771844545cbf6c53ced634af4a5
SHA191af686df0b426fc78b3f8b34bb9f1f6beec1f31
SHA256c2e41bcb037e2b6acda4700d6c70f1a0fe056e61d277ca39b978c6411d089bc8
SHA512a2d5a3cfa15560b6afa1b6f8eee97477a990502c30b73034f75b543b7e3f6fa816612eae2d187d47d6283f73932cfbdc31be55530ea1c3f2ebc6bcf07a2ce9bb