Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 17:26
Static task
static1
Behavioral task
behavioral1
Sample
a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe
-
Size
164KB
-
MD5
a78e3e5ddb17eaef1a376a005c16ce90
-
SHA1
b6fdc1e495f7de096ae3e638ccd76e4110fe1094
-
SHA256
ff9047d6b337e222f83b16b78674b5f55ec9a592a6dd379feb36168a9c3f57a0
-
SHA512
54404fb4f10340b08b087bc7d3a78985116f2b5db5b77f5ef080a5361b6c758b14dbc34e0a03613f4bfe04d54012119ecc918804d3499d34d0e71b8ffa7f2d58
-
SSDEEP
3072:W8lI9JuB/RVgU974KlGro2UWQRtgxC6c3ovNRdNUirqSmF7Nv5D:WJmVJ974KlGM/g46cYVWimF7hV
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe a44.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "services.exe" a44.exe -
Executes dropped EXE 3 IoCs
pid Process 2260 QvodSetupPlus3.exe 2776 a44.exe 2860 ~25948201.exe -
Loads dropped DLL 8 IoCs
pid Process 2256 a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe 2256 a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe 2256 a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe 2260 QvodSetupPlus3.exe 2260 QvodSetupPlus3.exe 2260 QvodSetupPlus3.exe 2776 a44.exe 2776 a44.exe -
resource yara_rule behavioral1/files/0x000e000000016d07-3.dat upx behavioral1/files/0x000a000000016d89-19.dat upx behavioral1/memory/2776-20-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2260-11-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2260-28-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2776-29-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2260-30-0x0000000000850000-0x00000000008A7000-memory.dmp upx behavioral1/memory/2260-31-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2776-32-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2260-45-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2776-46-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2260-48-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2260-52-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2260-56-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2260-58-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2260-62-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2260-68-0x0000000000400000-0x0000000000457000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\msconfig = "C:\\Windows\\system32\\R2Qon.exe" a44.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\R2Qon.exe a44.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ~25948201.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QvodSetupPlus3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a44.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2776 a44.exe 2776 a44.exe 2776 a44.exe 2776 a44.exe 2776 a44.exe 2776 a44.exe 2776 a44.exe 2776 a44.exe 2776 a44.exe 2776 a44.exe 2860 ~25948201.exe 2860 ~25948201.exe 2860 ~25948201.exe 2860 ~25948201.exe 2860 ~25948201.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2776 a44.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2260 QvodSetupPlus3.exe 2260 QvodSetupPlus3.exe 2260 QvodSetupPlus3.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2260 QvodSetupPlus3.exe 2260 QvodSetupPlus3.exe 2260 QvodSetupPlus3.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2260 2256 a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2260 2256 a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2260 2256 a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2260 2256 a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2260 2256 a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2260 2256 a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2260 2256 a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2776 2256 a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2776 2256 a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2776 2256 a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2776 2256 a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe 31 PID 2776 wrote to memory of 2860 2776 a44.exe 32 PID 2776 wrote to memory of 2860 2776 a44.exe 32 PID 2776 wrote to memory of 2860 2776 a44.exe 32 PID 2776 wrote to memory of 2860 2776 a44.exe 32 PID 2860 wrote to memory of 2720 2860 ~25948201.exe 33 PID 2860 wrote to memory of 2720 2860 ~25948201.exe 33 PID 2860 wrote to memory of 2720 2860 ~25948201.exe 33 PID 2860 wrote to memory of 2720 2860 ~25948201.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a78e3e5ddb17eaef1a376a005c16ce90_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\QvodSetupPlus3.exe"C:\Users\Admin\AppData\Local\Temp\QvodSetupPlus3.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2260
-
-
C:\Users\Admin\AppData\Local\Temp\a44.exe"C:\Users\Admin\AppData\Local\Temp\a44.exe"2⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\~25948201.exeC:\Users\Admin\AppData\Local\Temp\~25948201.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cmd.execmd4⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5ae2bd0997c469d7282cce81526657b19
SHA1f26a5ec472a1d1c6e6335fc0ba948788076cd115
SHA2563f4511364b3727f113897d79ddb837780b7ad9177004365f14f4984aa3fb2385
SHA512a25a83a1c17a55133c5d25611466f2cef804c2968ebac915f7c6202faa36aff6d4c988a1ed49e328d4c4faab8a9a43016e3e198fcc1d86a2c7fa3c80e39939b6
-
Filesize
149KB
MD5a3de6c880f4fbe1c2fdae63bed2587c5
SHA1d24408ca4349f83b66409e773fab10863469a1f6
SHA256eae20a59c483e08d98b03e9367af8069ae78133240f0ad73077db1f5f63c1e39
SHA512218523a61e1cb2da1e2f92170965bcb51f3dc006365be606cd3d19fe8abe54c6c59674c161febdeacdc0fa8974a5ed1bfe00471c1762184026646cbc9881d12e
-
Filesize
8KB
MD5aa895b6310ae611fac946bcb9ddf7e6f
SHA1427bd638a3d26ab9140f26bbfc1d9f6e4dda7ad9
SHA256bf5c3e35dd91d27990f08f352a202a6b622616c87e22c83e76de645a3e6315f6
SHA512a494dcebe62365ae5c816e44d31189dfb334556f343ebd49e4091688dde3c4d41b663cde0f43b9c8164e4a3e8b5367d8490d18040939e621170e741b238fc6eb