Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 14:18 UTC

General

  • Target

    eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe

  • Size

    134KB

  • MD5

    eff9fd511b62c7b9a5eb6c8584afc0cc

  • SHA1

    d173943fac4e87e17bb66e7a6d445c35c5df9a57

  • SHA256

    419a0ef3d60d9be1cfaa1ff897a8713d9699b4950b2fe932312a66f3f7a757e3

  • SHA512

    fe12a4057cd9b6a6ad16c491976dcdb99918be84790608b9ffac7a76a2ed8500f07dd61d96328833737f6446a72f484b6c9006e7164e6db52b1c4c297d4b2f08

  • SSDEEP

    3072:KL1SE8b1R1Fw6qPrZZGa68rBSf77Ul09z7AeF:w1SE8l6LHGa6gk77UloMeF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Windows\Pkiqia.exe
      C:\Windows\Pkiqia.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:1328

Network

  • flag-us
    DNS
    reference.com
    Pkiqia.exe
    Remote address:
    8.8.8.8:53
    Request
    reference.com
    IN A
    Response
    reference.com
    IN A
    151.101.190.114
  • flag-us
    DNS
    files.wordpress.com
    Pkiqia.exe
    Remote address:
    8.8.8.8:53
    Request
    files.wordpress.com
    IN A
    Response
    files.wordpress.com
    IN A
    192.0.72.2
  • flag-us
    DNS
    buyitave.com
    Pkiqia.exe
    Remote address:
    8.8.8.8:53
    Request
    buyitave.com
    IN A
    Response
  • flag-us
    DNS
    newfsite.com
    Pkiqia.exe
    Remote address:
    8.8.8.8:53
    Request
    newfsite.com
    IN A
    Response
  • flag-us
    DNS
    baqwi.com
    Pkiqia.exe
    Remote address:
    8.8.8.8:53
    Request
    baqwi.com
    IN A
    Response
  • flag-us
    DNS
    plusvan.com
    Pkiqia.exe
    Remote address:
    8.8.8.8:53
    Request
    plusvan.com
    IN A
    Response
    plusvan.com
    IN A
    3.216.130.164
    plusvan.com
    IN A
    54.83.203.203
    plusvan.com
    IN A
    44.218.195.21
  • flag-us
    POST
    http://plusvan.com/1wave.php
    Pkiqia.exe
    Remote address:
    3.216.130.164:80
    Request
    POST /1wave.php HTTP/1.1
    Accept: */*
    Content-Type: application/x-www-form-urlencoded
    Host: plusvan.com
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
    Content-Length: 309
    Connection: close
    Cache-Control: no-cache
    Response
    HTTP/1.1 301 Moved Permanently
    Server: awselb/2.0
    Date: Sat, 21 Sep 2024 14:18:57 GMT
    Content-Type: text/html
    Content-Length: 134
    Connection: close
    Location: https://www.domainmarket.com:443/buynow/plusvan.com
  • flag-us
    POST
    http://plusvan.com/1wave.php
    Pkiqia.exe
    Remote address:
    3.216.130.164:80
    Request
    POST /1wave.php HTTP/1.1
    Accept: */*
    Content-Type: application/x-www-form-urlencoded
    Host: plusvan.com
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
    Content-Length: 309
    Connection: close
    Cache-Control: no-cache
    Response
    HTTP/1.1 301 Moved Permanently
    Server: awselb/2.0
    Date: Sat, 21 Sep 2024 14:19:20 GMT
    Content-Type: text/html
    Content-Length: 134
    Connection: close
    Location: https://www.domainmarket.com:443/buynow/plusvan.com
  • flag-us
    DNS
    plusvan.com
    Pkiqia.exe
    Remote address:
    8.8.8.8:53
    Request
    plusvan.com
    IN A
    Response
    plusvan.com
    IN A
    54.83.203.203
    plusvan.com
    IN A
    44.218.195.21
    plusvan.com
    IN A
    3.216.130.164
  • flag-us
    POST
    http://plusvan.com/1wave.php
    Pkiqia.exe
    Remote address:
    54.83.203.203:80
    Request
    POST /1wave.php HTTP/1.1
    Accept: */*
    Content-Type: application/x-www-form-urlencoded
    Host: plusvan.com
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
    Content-Length: 309
    Connection: close
    Cache-Control: no-cache
    Response
    HTTP/1.1 301 Moved Permanently
    Server: awselb/2.0
    Date: Sat, 21 Sep 2024 14:20:03 GMT
    Content-Type: text/html
    Content-Length: 134
    Connection: close
    Location: https://www.domainmarket.com:443/buynow/plusvan.com
  • 3.216.130.164:80
    http://plusvan.com/1wave.php
    http
    Pkiqia.exe
    777 B
    565 B
    5
    5

    HTTP Request

    POST http://plusvan.com/1wave.php

    HTTP Response

    301
  • 3.216.130.164:80
    http://plusvan.com/1wave.php
    http
    Pkiqia.exe
    777 B
    565 B
    5
    5

    HTTP Request

    POST http://plusvan.com/1wave.php

    HTTP Response

    301
  • 54.83.203.203:80
    http://plusvan.com/1wave.php
    http
    Pkiqia.exe
    777 B
    565 B
    5
    5

    HTTP Request

    POST http://plusvan.com/1wave.php

    HTTP Response

    301
  • 8.8.8.8:53
    reference.com
    dns
    Pkiqia.exe
    59 B
    75 B
    1
    1

    DNS Request

    reference.com

    DNS Response

    151.101.190.114

  • 8.8.8.8:53
    files.wordpress.com
    dns
    Pkiqia.exe
    65 B
    81 B
    1
    1

    DNS Request

    files.wordpress.com

    DNS Response

    192.0.72.2

  • 8.8.8.8:53
    buyitave.com
    dns
    Pkiqia.exe
    58 B
    131 B
    1
    1

    DNS Request

    buyitave.com

  • 8.8.8.8:53
    newfsite.com
    dns
    Pkiqia.exe
    58 B
    131 B
    1
    1

    DNS Request

    newfsite.com

  • 8.8.8.8:53
    baqwi.com
    dns
    Pkiqia.exe
    55 B
    128 B
    1
    1

    DNS Request

    baqwi.com

  • 8.8.8.8:53
    plusvan.com
    dns
    Pkiqia.exe
    57 B
    105 B
    1
    1

    DNS Request

    plusvan.com

    DNS Response

    3.216.130.164
    54.83.203.203
    44.218.195.21

  • 8.8.8.8:53
    plusvan.com
    dns
    Pkiqia.exe
    57 B
    105 B
    1
    1

    DNS Request

    plusvan.com

    DNS Response

    54.83.203.203
    44.218.195.21
    3.216.130.164

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Pkiqia.exe

    Filesize

    134KB

    MD5

    eff9fd511b62c7b9a5eb6c8584afc0cc

    SHA1

    d173943fac4e87e17bb66e7a6d445c35c5df9a57

    SHA256

    419a0ef3d60d9be1cfaa1ff897a8713d9699b4950b2fe932312a66f3f7a757e3

    SHA512

    fe12a4057cd9b6a6ad16c491976dcdb99918be84790608b9ffac7a76a2ed8500f07dd61d96328833737f6446a72f484b6c9006e7164e6db52b1c4c297d4b2f08

  • C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job

    Filesize

    372B

    MD5

    e97baa6f2f930aa5b9ef1496d2f34991

    SHA1

    55ddf266af591bb2717962319be88fabe5bfd07a

    SHA256

    dfc21e47f7a28170d3c5c5aeb9d0ab2424c623532ea9aea136b92d727a25813a

    SHA512

    c06715aa97fb71451a4c2fd03da53c64e09e360595887f989f1bc4733cba0645fe2a8542bfa7cd8657103d3a3f3db24e324349f707dc77ae4ffdbb5e7dadc57e

  • memory/1328-51676-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1328-51675-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1328-51686-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1328-51685-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1328-11-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1328-14-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1328-13-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1328-51681-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1328-51679-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1328-51678-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1328-51677-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2868-0-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2868-3-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2868-2-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2868-12-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2868-1-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/2868-9-0x0000000001E10000-0x0000000001E4A000-memory.dmp

    Filesize

    232KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.