Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
361901604eb...18.exe
windows7-x64
761901604eb...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$TEMPLATES/Setup.exe
windows7-x64
7$TEMPLATES/Setup.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3KKjie.exe
windows7-x64
7KKjie.exe
windows10-2004-x64
7$EXEDIR/KK...fe.exe
windows7-x64
1$EXEDIR/KK...fe.exe
windows10-2004-x64
1$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3KKjie_safe.exe
windows7-x64
1KKjie_safe.exe
windows10-2004-x64
1KKjie_safe.dll
windows7-x64
1KKjie_safe.dll
windows10-2004-x64
1languages/Chinese.dll
windows7-x64
1languages/Chinese.dll
windows10-2004-x64
1xiezai.exe
windows7-x64
7xiezai.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$TEMPLATES...at.exe
windows7-x64
1$TEMPLATES...at.exe
windows10-2004-x64
1$TEMPLATES...t3.exe
windows7-x64
7$TEMPLATES...t3.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
61901604ebf438822f721a051bdf4f53_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
61901604ebf438822f721a051bdf4f53_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$TEMPLATES/Setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$TEMPLATES/Setup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
KKjie.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
KKjie.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$EXEDIR/KKjie_safe.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$EXEDIR/KKjie_safe.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
KKjie_safe.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
KKjie_safe.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
KKjie_safe.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
KKjie_safe.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
languages/Chinese.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
languages/Chinese.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
xiezai.exe
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
xiezai.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
$TEMPLATES/installstat.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
$TEMPLATES/installstat.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
$TEMPLATES/redalert3.exe
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
$TEMPLATES/redalert3.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
General
-
Target
KKjie.exe
-
Size
181KB
-
MD5
67e89640d9ed9f8c7bc8a219e42a033f
-
SHA1
d2e5402fca8646e7b09a26e2866c0ab013c113f7
-
SHA256
d41dbe9ba5366a7701d9b45ab18a993476eedf34775e47a34fcc52f7ce690a3e
-
SHA512
c4833e39457540e18c25320c12148c2532f685d706eace42f04838f815c210fa7428ce90cf64397d5e7fb9939e91e1af400db6bc46138b979e06cb139627fe92
-
SSDEEP
3072:iZMJnTeM4cJJliRR7mH4QvaNCj3Vf7pfTLR/bNTubouYKux+PlXEcWxGAc+KTWYu:6eTeM/cRcH4QiNCjl75d1ubAV8ZWFcLM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2148 KKjie_safe.exe -
Loads dropped DLL 7 IoCs
pid Process 580 KKjie.exe 580 KKjie.exe 580 KKjie.exe 580 KKjie.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 580 KKjie.exe 580 KKjie.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe 2148 KKjie_safe.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2148 KKjie_safe.exe Token: SeIncBasePriorityPrivilege 2148 KKjie_safe.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2148 KKjie_safe.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 580 wrote to memory of 2148 580 KKjie.exe 30 PID 580 wrote to memory of 2148 580 KKjie.exe 30 PID 580 wrote to memory of 2148 580 KKjie.exe 30 PID 580 wrote to memory of 2148 580 KKjie.exe 30 PID 580 wrote to memory of 2148 580 KKjie.exe 30 PID 580 wrote to memory of 2148 580 KKjie.exe 30 PID 580 wrote to memory of 2148 580 KKjie.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\KKjie.exe"C:\Users\Admin\AppData\Local\Temp\KKjie.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Users\Admin\AppData\Local\Temp\KKjie_safe.exeC:\Users\Admin\AppData\Local\Temp\KKjie_safe.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5258dd27107feabb1969908a9387a79d7
SHA180f85b610e57d6ab07988cdae60c83300bef6a8f
SHA256f4fc1344c32ad1c075067c6abfd168a1815dbc6f97103e83e7e8e708230889d2
SHA512e2df96efab3ea794e75b6a3c9038601c7abd956b41fbbcc4fb60013e0d319d9978f539dc0f944778d05d2e384192d918e06dce8bf76f355d0cbfd142313b9a2b
-
Filesize
377KB
MD5ac68dffc261c8625c5f2a94364ca10c9
SHA1d5873084dcf4a74631c9abe82f1afc3ba1216464
SHA25616694059e7073810021960bb709f814f42490a5219f7970fa201b3d8ef259db7
SHA512d7ab568b6906d6d0ff924da59983cb8def9cfbb76ed93371e815c26f2f59f3a33edef0e65419bdaee02bcf85efc7a5b856949de5c26afab689aeada50a705b59
-
Filesize
3KB
MD58614c450637267afacad1645e23ba24a
SHA1e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2
SHA2560fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758
SHA512af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b