Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3aef6897757...18.exe
windows7-x64
7aef6897757...18.exe
windows10-2004-x64
7$0/finderquery.dll
windows7-x64
1$0/finderquery.dll
windows10-2004-x64
1$0/finderquery.exe
windows7-x64
1$0/finderquery.exe
windows10-2004-x64
3$0/uninstall.exe
windows7-x64
7$0/uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
101s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
aef6897757c06346566f8db9ac13351a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aef6897757c06346566f8db9ac13351a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$0/finderquery.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$0/finderquery.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$0/finderquery.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$0/finderquery.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$0/uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$0/uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
aef6897757c06346566f8db9ac13351a_JaffaCakes118.exe
-
Size
997KB
-
MD5
aef6897757c06346566f8db9ac13351a
-
SHA1
b4cb09b65cb999741ff5b14243d58106841fe2f1
-
SHA256
d0f8c38d4c1bd79eea3ccd442f529671e254d101f169f8125aea395601f884c5
-
SHA512
53e63c21b31aca34e51edf144558c4d2649cd36302194f19f9e072fb83608fa2997ae23d3d371242d1a7c6e9aa3194d54e83630384f4348b709658980cffc3fe
-
SSDEEP
24576:pHhoKaMIby7GYuqUuswKikhq4U5X+80cs0Ybj/hkagf9rm:Fho52ZVUuknq/5X+80cs062agf96
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 708 aef6897757c06346566f8db9ac13351a_JaffaCakes118.exe 708 aef6897757c06346566f8db9ac13351a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aef6897757c06346566f8db9ac13351a_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 708 aef6897757c06346566f8db9ac13351a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aef6897757c06346566f8db9ac13351a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aef6897757c06346566f8db9ac13351a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
700B
MD525e1ef3ac341f472b746dee804f79b8a
SHA1c8275ae24acde42bdc2e7d12829524c82cf66c3b
SHA2565cc7e8e92515e21079c04be11ebdcaa31624d3c922df174adcad7bfa3fc544d4
SHA512662ee5fafd1dbc34053d1f0063355332272438e1fb3c367d540333e2387cbae510bd66f3518f0c6850a0649a9b91940d4c0152710a030702fe54b8f4afe3fd81
-
Filesize
13KB
MD5d765c492c21689e3d9d61634371fd861
SHA1ac200933671ae52c9d5544d0e2e8e9144d286c83
SHA256551e6042dd494ea01549555ffc194ab9729da09058ec714eb368dd06642c9bbc
SHA5129919a9e848c8f1e26c75d0d29207571e4b86a4140bd554743d2c1f8bd7f386fe4919345b163d89a5d907fb165e435ba0ac5f6b1101713636141f156a420e2e0f
-
Filesize
10KB
MD5fe24766ba314f620d57d0cf7339103c0
SHA18641545f03f03ff07485d6ec4d7b41cbb898c269
SHA256802ef71440f662f456bed6283a5ff78066af016897fe6bfd29cac6edc2967bbd
SHA51260d36959895cebf29c4e7713e6d414980139c7aa4ed1c8c96fefb672c1263af0ce909fb409534355895649c0e8056635112efb0da2ba05694446aec2ca77e2e3