Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe
-
Size
148KB
-
MD5
d50fd18aac10d482d9921cfe038e9661
-
SHA1
7a7ffa618b37c4b50cd05e3f39b38251daa7049d
-
SHA256
b5ef3b706f84f927c6bcb3d0ce2e418efc0e521c8df342a51b55ac5c0d837f36
-
SHA512
143fb20de9b07cdc44be3707a2cfdef138080580f28ac5df7f334edfdc10081693f66812726179961337f9d02399241c1a7c6349b7e180f5d3f80f75e28ba445
-
SSDEEP
3072:ZxvCBjrvD734HOb3zbSN3zOdfAkKEjXnMX4p5ViHsnTmFIy:ZxvCBjf73CzO9Ak97ngi7iHsTA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2416 Qjakua.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\5GUTNY6MFK = "C:\\Windows\\Qjakua.exe" Qjakua.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe File created C:\Windows\Qjakua.exe d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe File opened for modification C:\Windows\Qjakua.exe d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qjakua.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main Qjakua.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International Qjakua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe 2416 Qjakua.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2416 2308 d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe 30 PID 2308 wrote to memory of 2416 2308 d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe 30 PID 2308 wrote to memory of 2416 2308 d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe 30 PID 2308 wrote to memory of 2416 2308 d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\Qjakua.exeC:\Windows\Qjakua.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5d50fd18aac10d482d9921cfe038e9661
SHA17a7ffa618b37c4b50cd05e3f39b38251daa7049d
SHA256b5ef3b706f84f927c6bcb3d0ce2e418efc0e521c8df342a51b55ac5c0d837f36
SHA512143fb20de9b07cdc44be3707a2cfdef138080580f28ac5df7f334edfdc10081693f66812726179961337f9d02399241c1a7c6349b7e180f5d3f80f75e28ba445
-
Filesize
372B
MD5ded170909715aa3fbfb73868e69d8c0a
SHA1a9de10ea49901d64fd72dc3c98deed6cec39dcf6
SHA256e0a4efb35d0d42e63e3a098b0470d2f5e28f834b868868ca7d6745eb06ab61ec
SHA51217114ab04c3be4071d50d237fee0e94e11c138e3ec94f0303412659a5e4ede918a800584397d50777414c4cfed8359cf5a586adf93112ac824f95537aec3b856