Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe
-
Size
400KB
-
MD5
f6345e3b45591ab9a44d724c0ff8656d
-
SHA1
bf2174b48daeadb6066eabc1f518eeb510aee516
-
SHA256
a8fb90b6a1068f695e0ea092262e4a6085300e9f3dafc57da48bee837ec353a3
-
SHA512
63145c5bbb265dbcbe52698f7ef9cd3bc5ed43944a1abb7577286cdc94874e25164f1a19bf5376f37a22b579b7ee2ad7862b1d546a11045fd423e90bfc003c95
-
SSDEEP
6144:4jlYKRF/LReWAsUypbJmVYCdkssUoUdi9lruFvbj8h+V7PiA+mfWIDz51x8zN:4jauDReW74VHWIDz51eJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1076 qervso.exe -
Loads dropped DLL 2 IoCs
pid Process 2496 f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe 2496 f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\qervso.exe" qervso.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qervso.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 1076 2496 f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe 30 PID 2496 wrote to memory of 1076 2496 f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe 30 PID 2496 wrote to memory of 1076 2496 f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe 30 PID 2496 wrote to memory of 1076 2496 f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\ProgramData\qervso.exe"C:\ProgramData\qervso.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400KB
MD5f8eeb839bb6242cbde9b3428abd06948
SHA10b54a5d051b8f7cda0b2cc93fdb1b35e2cdef580
SHA2562705bf987e83ae946d0743b19605e8014c7b05d75a3aaaadc7f94dadc28c32cc
SHA512dcf085a9a3f837e363ba14fc4f4c7bc8333626ea498060b2bd84cceeb997193f137c7d035068a154a9cbfc8c8ace6d076cf215e79c84e827554b30f894cd0b6a
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
263KB
MD5b597ad67bd40b2f00abd84b7ec4aa313
SHA103abc6ec09d3ed9b4cedb32760567d9034112a1a
SHA25625c865dade39525301059a9f97c3bdd783b3e2f552eca0c97c9609180a63f1e1
SHA512989bcea7ae2fca0038e09ba6e5a8df080ccaa60e1554e22ff6f82a57444e95281350df8f95e9930404e7d203b9ca3b262117ab6b0eb4753a48e66b5fad8272ae