Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/01/2025, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7305b95f9a46c2bcbe1ae7c093406f30.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7305b95f9a46c2bcbe1ae7c093406f30.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7305b95f9a46c2bcbe1ae7c093406f30.exe
-
Size
420KB
-
MD5
7305b95f9a46c2bcbe1ae7c093406f30
-
SHA1
64aa5d9d9f7547b8d36472709d98acfa754a4a42
-
SHA256
23395541d41a67c4e3c3649aed1039f042500781428a5afab1c3ebb3ebca56a4
-
SHA512
55dd25e5693841779158492fabe6a489683993fa62ff306081437d13447c5a0d2d1d7f86b0ea43d4abb7b1cd7bbfaa18d721797c787cc3a5ce9ef6e7fd0f8c20
-
SSDEEP
6144:si8drdA114CJkuvY4+bEXxxJIc+Zgnz8uJ72kY2GL4rO:yrGOekuaIvJIc+OnbGE
Malware Config
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/2688-5-0x000000001ADE0000-0x000000001AE1E000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2864 windows.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Quasar Client Startup = "C:\\Users\\Admin\\AppData\\Roaming\\SubDir\\windows.exe" JaffaCakes118_7305b95f9a46c2bcbe1ae7c093406f30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Quasar Client Startup = "C:\\Users\\Admin\\AppData\\Roaming\\SubDir\\windows.exe" windows.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2688 JaffaCakes118_7305b95f9a46c2bcbe1ae7c093406f30.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe 2864 windows.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2688 JaffaCakes118_7305b95f9a46c2bcbe1ae7c093406f30.exe Token: SeDebugPrivilege 2864 windows.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2864 windows.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2864 2688 JaffaCakes118_7305b95f9a46c2bcbe1ae7c093406f30.exe 32 PID 2688 wrote to memory of 2864 2688 JaffaCakes118_7305b95f9a46c2bcbe1ae7c093406f30.exe 32 PID 2688 wrote to memory of 2864 2688 JaffaCakes118_7305b95f9a46c2bcbe1ae7c093406f30.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7305b95f9a46c2bcbe1ae7c093406f30.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7305b95f9a46c2bcbe1ae7c093406f30.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Roaming\SubDir\windows.exe"C:\Users\Admin\AppData\Roaming\SubDir\windows.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
420KB
MD57305b95f9a46c2bcbe1ae7c093406f30
SHA164aa5d9d9f7547b8d36472709d98acfa754a4a42
SHA25623395541d41a67c4e3c3649aed1039f042500781428a5afab1c3ebb3ebca56a4
SHA51255dd25e5693841779158492fabe6a489683993fa62ff306081437d13447c5a0d2d1d7f86b0ea43d4abb7b1cd7bbfaa18d721797c787cc3a5ce9ef6e7fd0f8c20