Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 14:18 UTC
Behavioral task
behavioral1
Sample
eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe
-
Size
134KB
-
MD5
eff9fd511b62c7b9a5eb6c8584afc0cc
-
SHA1
d173943fac4e87e17bb66e7a6d445c35c5df9a57
-
SHA256
419a0ef3d60d9be1cfaa1ff897a8713d9699b4950b2fe932312a66f3f7a757e3
-
SHA512
fe12a4057cd9b6a6ad16c491976dcdb99918be84790608b9ffac7a76a2ed8500f07dd61d96328833737f6446a72f484b6c9006e7164e6db52b1c4c297d4b2f08
-
SSDEEP
3072:KL1SE8b1R1Fw6qPrZZGa68rBSf77Ul09z7AeF:w1SE8l6LHGa6gk77UloMeF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1328 Pkiqia.exe -
resource yara_rule behavioral1/memory/2868-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2868-9-0x0000000001E10000-0x0000000001E4A000-memory.dmp upx behavioral1/files/0x0008000000015d2e-10.dat upx behavioral1/memory/1328-11-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe File created C:\Windows\Pkiqia.exe eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe File opened for modification C:\Windows\Pkiqia.exe eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Pkiqia.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Pkiqia.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pkiqia.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main Pkiqia.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International Pkiqia.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe 1328 Pkiqia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 1328 2868 eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe 28 PID 2868 wrote to memory of 1328 2868 eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe 28 PID 2868 wrote to memory of 1328 2868 eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe 28 PID 2868 wrote to memory of 1328 2868 eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\Pkiqia.exeC:\Windows\Pkiqia.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1328
-
Network
-
Remote address:8.8.8.8:53Requestreference.comIN AResponsereference.comIN A151.101.190.114
-
Remote address:8.8.8.8:53Requestfiles.wordpress.comIN AResponsefiles.wordpress.comIN A192.0.72.2
-
Remote address:8.8.8.8:53Requestbuyitave.comIN AResponse
-
Remote address:8.8.8.8:53Requestnewfsite.comIN AResponse
-
Remote address:8.8.8.8:53Requestbaqwi.comIN AResponse
-
Remote address:8.8.8.8:53Requestplusvan.comIN AResponseplusvan.comIN A3.216.130.164plusvan.comIN A54.83.203.203plusvan.comIN A44.218.195.21
-
Remote address:3.216.130.164:80RequestPOST /1wave.php HTTP/1.1
Accept: */*
Content-Type: application/x-www-form-urlencoded
Host: plusvan.com
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Content-Length: 309
Connection: close
Cache-Control: no-cache
ResponseHTTP/1.1 301 Moved Permanently
Date: Sat, 21 Sep 2024 14:18:57 GMT
Content-Type: text/html
Content-Length: 134
Connection: close
Location: https://www.domainmarket.com:443/buynow/plusvan.com
-
Remote address:3.216.130.164:80RequestPOST /1wave.php HTTP/1.1
Accept: */*
Content-Type: application/x-www-form-urlencoded
Host: plusvan.com
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Content-Length: 309
Connection: close
Cache-Control: no-cache
ResponseHTTP/1.1 301 Moved Permanently
Date: Sat, 21 Sep 2024 14:19:20 GMT
Content-Type: text/html
Content-Length: 134
Connection: close
Location: https://www.domainmarket.com:443/buynow/plusvan.com
-
Remote address:8.8.8.8:53Requestplusvan.comIN AResponseplusvan.comIN A54.83.203.203plusvan.comIN A44.218.195.21plusvan.comIN A3.216.130.164
-
Remote address:54.83.203.203:80RequestPOST /1wave.php HTTP/1.1
Accept: */*
Content-Type: application/x-www-form-urlencoded
Host: plusvan.com
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Content-Length: 309
Connection: close
Cache-Control: no-cache
ResponseHTTP/1.1 301 Moved Permanently
Date: Sat, 21 Sep 2024 14:20:03 GMT
Content-Type: text/html
Content-Length: 134
Connection: close
Location: https://www.domainmarket.com:443/buynow/plusvan.com
-
777 B 565 B 5 5
HTTP Request
POST http://plusvan.com/1wave.phpHTTP Response
301 -
777 B 565 B 5 5
HTTP Request
POST http://plusvan.com/1wave.phpHTTP Response
301 -
777 B 565 B 5 5
HTTP Request
POST http://plusvan.com/1wave.phpHTTP Response
301
-
59 B 75 B 1 1
DNS Request
reference.com
DNS Response
151.101.190.114
-
65 B 81 B 1 1
DNS Request
files.wordpress.com
DNS Response
192.0.72.2
-
58 B 131 B 1 1
DNS Request
buyitave.com
-
58 B 131 B 1 1
DNS Request
newfsite.com
-
55 B 128 B 1 1
DNS Request
baqwi.com
-
57 B 105 B 1 1
DNS Request
plusvan.com
DNS Response
3.216.130.16454.83.203.20344.218.195.21
-
57 B 105 B 1 1
DNS Request
plusvan.com
DNS Response
54.83.203.20344.218.195.213.216.130.164
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5eff9fd511b62c7b9a5eb6c8584afc0cc
SHA1d173943fac4e87e17bb66e7a6d445c35c5df9a57
SHA256419a0ef3d60d9be1cfaa1ff897a8713d9699b4950b2fe932312a66f3f7a757e3
SHA512fe12a4057cd9b6a6ad16c491976dcdb99918be84790608b9ffac7a76a2ed8500f07dd61d96328833737f6446a72f484b6c9006e7164e6db52b1c4c297d4b2f08
-
Filesize
372B
MD5e97baa6f2f930aa5b9ef1496d2f34991
SHA155ddf266af591bb2717962319be88fabe5bfd07a
SHA256dfc21e47f7a28170d3c5c5aeb9d0ab2424c623532ea9aea136b92d727a25813a
SHA512c06715aa97fb71451a4c2fd03da53c64e09e360595887f989f1bc4733cba0645fe2a8542bfa7cd8657103d3a3f3db24e324349f707dc77ae4ffdbb5e7dadc57e