Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
29d1280122a85b31988f66ae140435b0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
29d1280122a85b31988f66ae140435b0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
29d1280122a85b31988f66ae140435b0_JaffaCakes118.exe
-
Size
415KB
-
MD5
29d1280122a85b31988f66ae140435b0
-
SHA1
f4d8ce8e94bdc292bd3faf053b8d95cc3608b591
-
SHA256
caa23af87fac258aef000af8dfb7259a658b0a533aed7be140bad622e7c36a85
-
SHA512
44bebc65500df0e7f7a933b4e6d53fee349ddea8fb56d575461dd960a0ed6a5ac919223f652df74246bcbb489b68464b7ebad9ff9e6e861fa52e9fd11f21f222
-
SSDEEP
12288:Iu3URWtsYf8PemjE8h0UxH9ND6fvhMrfB:IkQe8PemjTh0Ul/8vh+5
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2684 qgvryde.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\qgvryde.exe 29d1280122a85b31988f66ae140435b0_JaffaCakes118.exe File created C:\PROGRA~3\Mozilla\yrphqkg.dll qgvryde.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29d1280122a85b31988f66ae140435b0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qgvryde.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2444 29d1280122a85b31988f66ae140435b0_JaffaCakes118.exe 2684 qgvryde.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2684 2632 taskeng.exe 31 PID 2632 wrote to memory of 2684 2632 taskeng.exe 31 PID 2632 wrote to memory of 2684 2632 taskeng.exe 31 PID 2632 wrote to memory of 2684 2632 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\29d1280122a85b31988f66ae140435b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29d1280122a85b31988f66ae140435b0_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2444
-
C:\Windows\system32\taskeng.exetaskeng.exe {FB55872C-3997-42E8-AB3F-89D753038C19} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\PROGRA~3\Mozilla\qgvryde.exeC:\PROGRA~3\Mozilla\qgvryde.exe -zzpkmim2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
415KB
MD5c2c8c449edf792d2a21b1ca67dec3219
SHA104ba5648d3c663570c3f932c4cdd835f3f80a94d
SHA2563a4867c2524334c478f7c8e7c05c9732a47902fc1a450911dc12bf97f656596b
SHA5123cb20a3325d5b43d11d1d1a274cece49572263267070572104a3f591a8c9f253262c6de1cdce578c42781e274e7727857269ac49d45c33a3bdac3c19538dee7f