Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 16:59 UTC

General

  • Target

    ebca9fa879db0393656dcab8b157f83b_JaffaCakes118.exe

  • Size

    168KB

  • MD5

    ebca9fa879db0393656dcab8b157f83b

  • SHA1

    6ec35c95e835f5aabd52b4ff9c61cce2c55cb1b8

  • SHA256

    323418a8f2b9a75fcafe1d3173a338c881f6c97db760cf33c8e223fcf67eaf07

  • SHA512

    5be7f9fc0c79637f2f88a1c428567eab6c5f8c416a0c98a3eb07f969b5939de7aa1e28f7f99ab4d3a4f7f8f2f66fac5228d89595d235b414bc710abf96eda34b

  • SSDEEP

    3072:n4LqsDP/vfP/vfP/I4oYII9IX7IrX5kMEdQvfbzizb7j7rOizodjoeyZGpmS2aWS:IrXa3QLib37rOizaGZsmS2bqg6L

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebca9fa879db0393656dcab8b157f83b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ebca9fa879db0393656dcab8b157f83b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ1~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ1~1.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ1~1.EXE
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ1~1.EXE
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:2092
  • C:\Windows\SysWOW64\zqhjao.exe
    C:\Windows\SysWOW64\zqhjao.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Windows\SysWOW64\zqhjao.exe
      C:\Windows\SysWOW64\zqhjao.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:1716

Network

  • flag-us
    DNS
    hondxx.vicp.cc
    zqhjao.exe
    Remote address:
    8.8.8.8:53
    Request
    hondxx.vicp.cc
    IN A
    Response
    hondxx.vicp.cc
    IN A
    0.0.0.0
No results found
  • 8.8.8.8:53
    hondxx.vicp.cc
    dns
    zqhjao.exe
    60 B
    76 B
    1
    1

    DNS Request

    hondxx.vicp.cc

    DNS Response

    0.0.0.0

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ1~1.EXE

    Filesize

    59KB

    MD5

    fd39c8bba0d17322918342e3dd7ccfa9

    SHA1

    eb378ed791cf20245b61c809a0daa8ad1f4a3c3a

    SHA256

    7023a62ba94d806e2a9cff090223073a0284a260ac495554dc4e8700f91db4f7

    SHA512

    4e579daab259228bc69f8f48ee970a09c9190bb02acd043ee2ec27e85a73613738d2f59748b64d540397fcea8afa236a64b75c68f3bc314d854993474e5d9ce3

  • memory/1684-0-0x0000000001000000-0x0000000001052000-memory.dmp

    Filesize

    328KB

  • memory/1684-10-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1684-9-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1684-26-0x0000000001000000-0x0000000001052000-memory.dmp

    Filesize

    328KB

  • memory/1716-22-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1716-29-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2092-23-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2388-14-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2412-20-0x0000000000020000-0x000000000003B000-memory.dmp

    Filesize

    108KB

  • memory/2412-28-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.