Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
26bd166a2e0524599ee68cd14e7dd6ec_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
26bd166a2e0524599ee68cd14e7dd6ec_JaffaCakes118.exe
-
Size
263KB
-
MD5
26bd166a2e0524599ee68cd14e7dd6ec
-
SHA1
8a7448202a6f77bf9c588fbcd6ad7e285397b3af
-
SHA256
e4d91e9cb3c69443b242a563a6b6d4c129c9429abb012271f136c8382121847e
-
SHA512
8186d97cb9f65119c589d8f07395cbaf9d38df78aa9bb480b780304f31f0bb9a72a4e08d61e57c8543d6505d371e69601eec79301b690af698c5058ce9834e9f
-
SSDEEP
6144:KYCcXIqGqL/GvMU4g6Te8e5sNydDhjbmdDQfzrbI6Cm:8MPl/EM46a15syFeDQfzwVm
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4956 Regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C74CDF30-68C2-49B4-9918-EBD66B8D9FBF}\ Regsvr32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C74CDF30-68C2-49B4-9918-EBD66B8D9FBF} Regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\aqme.ini 26bd166a2e0524599ee68cd14e7dd6ec_JaffaCakes118.exe File created C:\Windows\SysWOW64\qgepbmqaqiczv.dll 26bd166a2e0524599ee68cd14e7dd6ec_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\erttersbar.dll 26bd166a2e0524599ee68cd14e7dd6ec_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26bd166a2e0524599ee68cd14e7dd6ec_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C74CDF30-68C2-49B4-9918-EBD66B8D9FBF}\ProgID\ = "qgepbmqaqiczv.TIEBHOCom" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C74CDF30-68C2-49B4-9918-EBD66B8D9FBF}\InprocServer32 Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C74CDF30-68C2-49B4-9918-EBD66B8D9FBF}\InprocServer32\ = "C:\\Windows\\SysWow64\\qgepbmqaqiczv.dll" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C74CDF30-68C2-49B4-9918-EBD66B8D9FBF}\InprocServer32\ThreadingModel = "Apartment" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\qgepbmqaqiczv.TIEBHOCom\Clsid Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C74CDF30-68C2-49B4-9918-EBD66B8D9FBF}\ProgID Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C74CDF30-68C2-49B4-9918-EBD66B8D9FBF} Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C74CDF30-68C2-49B4-9918-EBD66B8D9FBF}\ Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\qgepbmqaqiczv.TIEBHOCom Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qgepbmqaqiczv.TIEBHOCom\ Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qgepbmqaqiczv.TIEBHOCom\Clsid\ = "{C74CDF30-68C2-49B4-9918-EBD66B8D9FBF}" Regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1344 wrote to memory of 4956 1344 26bd166a2e0524599ee68cd14e7dd6ec_JaffaCakes118.exe 84 PID 1344 wrote to memory of 4956 1344 26bd166a2e0524599ee68cd14e7dd6ec_JaffaCakes118.exe 84 PID 1344 wrote to memory of 4956 1344 26bd166a2e0524599ee68cd14e7dd6ec_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\26bd166a2e0524599ee68cd14e7dd6ec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\26bd166a2e0524599ee68cd14e7dd6ec_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32.exe /s C:\Windows\system32\qgepbmqaqiczv.dll2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
573KB
MD54636d909dc9e7069e9386a6230b5f9a1
SHA10071a33b179452f67452c8bddf88622549c6ba10
SHA2564bc0d5b23f5163af75476a7ff3110b3bf2e72cf8960b443508eef3aa79c42683
SHA5125755026de8888c4ac9aae46c9d730a9408c50a34eaeccf7fbc9aa5a92592b572b6f0870ffdd55a5a4af01c62a8befd2b71765df38c20a5045b729c8639dbec5e