Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
361901604eb...18.exe
windows7-x64
761901604eb...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$TEMPLATES/Setup.exe
windows7-x64
7$TEMPLATES/Setup.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3KKjie.exe
windows7-x64
7KKjie.exe
windows10-2004-x64
7$EXEDIR/KK...fe.exe
windows7-x64
1$EXEDIR/KK...fe.exe
windows10-2004-x64
1$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3KKjie_safe.exe
windows7-x64
1KKjie_safe.exe
windows10-2004-x64
1KKjie_safe.dll
windows7-x64
1KKjie_safe.dll
windows10-2004-x64
1languages/Chinese.dll
windows7-x64
1languages/Chinese.dll
windows10-2004-x64
1xiezai.exe
windows7-x64
7xiezai.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$TEMPLATES...at.exe
windows7-x64
1$TEMPLATES...at.exe
windows10-2004-x64
1$TEMPLATES...t3.exe
windows7-x64
7$TEMPLATES...t3.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
61901604ebf438822f721a051bdf4f53_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
61901604ebf438822f721a051bdf4f53_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$TEMPLATES/Setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$TEMPLATES/Setup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
KKjie.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
KKjie.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$EXEDIR/KKjie_safe.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$EXEDIR/KKjie_safe.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
KKjie_safe.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
KKjie_safe.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
KKjie_safe.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
KKjie_safe.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
languages/Chinese.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
languages/Chinese.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
xiezai.exe
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
xiezai.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
$TEMPLATES/installstat.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
$TEMPLATES/installstat.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
$TEMPLATES/redalert3.exe
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
$TEMPLATES/redalert3.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
General
-
Target
61901604ebf438822f721a051bdf4f53_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
61901604ebf438822f721a051bdf4f53
-
SHA1
e7a3fe6b12a188d8f352a259e1a7a78310cc3460
-
SHA256
a4e10fe06bb5202f8b07f3264adf23bd3d3825e214fef6b096adbe5d6a530e91
-
SHA512
fb0ea549b0f2101954b1247bec2ad74ffa2c67bafeb7973746e342be0cdc3090e1ade6722ca577a574223e304076ba488a0e10f537673613e7c843a02b21a484
-
SSDEEP
24576:nMM7up2lA3/eU93w26xznXN0fyaU3iPeuBqpwiwuNPITldbWn1mBbeIk:MklGWUFw5DN0bGuUp0u2Jw1mBbeIk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2720 Setup.exe -
Loads dropped DLL 5 IoCs
pid Process 2784 61901604ebf438822f721a051bdf4f53_JaffaCakes118.exe 2720 Setup.exe 2720 Setup.exe 2720 Setup.exe 2720 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000c000000012275-2.dat nsis_installer_1 behavioral1/files/0x000c000000012275-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2720 Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2720 2784 61901604ebf438822f721a051bdf4f53_JaffaCakes118.exe 31 PID 2784 wrote to memory of 2720 2784 61901604ebf438822f721a051bdf4f53_JaffaCakes118.exe 31 PID 2784 wrote to memory of 2720 2784 61901604ebf438822f721a051bdf4f53_JaffaCakes118.exe 31 PID 2784 wrote to memory of 2720 2784 61901604ebf438822f721a051bdf4f53_JaffaCakes118.exe 31 PID 2784 wrote to memory of 2720 2784 61901604ebf438822f721a051bdf4f53_JaffaCakes118.exe 31 PID 2784 wrote to memory of 2720 2784 61901604ebf438822f721a051bdf4f53_JaffaCakes118.exe 31 PID 2784 wrote to memory of 2720 2784 61901604ebf438822f721a051bdf4f53_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\61901604ebf438822f721a051bdf4f53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\61901604ebf438822f721a051bdf4f53_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Setup.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Setup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
566B
MD5e6952f71b9bad3446e5279226781c94e
SHA11ada82d82160ba5241927574e964ac998eaf5e64
SHA256fa06ab59f9d7bb451e13812fa51c83870b1cdc8a59281b72de55b23ae538be82
SHA512a2cb3a8b9734f31b583dd3f1900efafb5a918cd431aa5833f62bc5f1d1b3aaa298ed70de9f2bdbff14e0e28f196f1f3bdc431cfd82310c48f42c48e58c7f785c
-
Filesize
15KB
MD59a886711c559308c39c01c20e9d9a1e3
SHA10f27cf1cf6e4960e140651b68d72ed4b92c58e9e
SHA25698be8860d38ad9cf31b55a1a04594de59eabad67510ba2a33ed20a80863ddfa4
SHA5124dabdd9ea7a8330a367589a3975a9dc7286b82c66efc7db118b4d7a2db08a467851c6d3dc991668e13c4dd5473aa974e9696a2226039db94df8b198da54354a3
-
Filesize
1.1MB
MD5357a8dd0433cde3759f13b42f493c4e0
SHA12ba4a971e1d398589233e770030581a9767d4240
SHA2562b4aa368f9b1363aa19b9de02f1b41fabde07d2359014eb456746cd7d66aba2c
SHA512ce0432ce668dc60841832b0c14babd4e77a055709d9e0d027a51c2c6b500d99348f71d9aea2f1846781623289845a6690c037b8a1a40da97402f34651ba86488