Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2025, 03:10 UTC

General

  • Target

    JaffaCakes118_1d667e3b4e1c53babe3c3e0e17c7ae38.exe

  • Size

    1.4MB

  • MD5

    1d667e3b4e1c53babe3c3e0e17c7ae38

  • SHA1

    9b867c3ca75e7f827d88667a244b1865d06fbad7

  • SHA256

    fb3478b43c949fc2dd969264d0e8ce4db1b4ab829bb84fd47c297291a6f0d748

  • SHA512

    9c1ffd5a969755b64dfd82f9ffb577bbf373e04978d1e527cb8d5ab0c483b265fe73f812e02718094388bbfac67f41fe1dbe208361755ff164503eae8d01c156

  • SSDEEP

    24576:gHvZTa0cSiedI4d1TQ00vtKn60rT47pyw8zLHjTLUVw/JbZsTzRkXeSnmoMQ:oBT/xdxGwrT47p5IjTLUqxZ+RkXeSn2

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1d667e3b4e1c53babe3c3e0e17c7ae38.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1d667e3b4e1c53babe3c3e0e17c7ae38.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Windows\SysWOW64\DEGYGN\QHR.exe
      "C:\Windows\system32\DEGYGN\QHR.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DEGYGN\AKV.exe

    Filesize

    461KB

    MD5

    eed8ebfafcd3dcb0f88b237388fba8df

    SHA1

    620767d6de979bf360e3a188ed03534c769f337b

    SHA256

    dc3c5152d69547ffb583574707025eee74af46882cdf851221f66b1e81d2ed90

    SHA512

    28148a2bfdbcaf61f5f664c6b4dd0377d151d775ad001818da2bba6327f02020fabb016a4c8aaa5f841ea1dc1a6d8419bca55bc74924a657476e15abbd8dabb3

  • C:\Windows\SysWOW64\DEGYGN\QHR.001

    Filesize

    61KB

    MD5

    34c92b717ae97bc926f56ba56a44f24a

    SHA1

    ccaf3c6bf0c73564d0bf19c92b8d25008ffffbfa

    SHA256

    6e60d85b35f5e9222375f606e4116b38364a4a943596ddb0d914cf1cf4791774

    SHA512

    2a9eb63837db128c9e036976d903ebd925e6952ab6bf4efa0e370e79f9fefe0ed6e44e4ab444f56ace1149f4dd14797f568e8827e7cebd1e5581dcf309f9745a

  • C:\Windows\SysWOW64\DEGYGN\QHR.002

    Filesize

    43KB

    MD5

    246761f047f6aa98d6eaad66a2f883b9

    SHA1

    42474a5b23d03e094103b62fd7e820457cf807c4

    SHA256

    3774021a3cdf32d23fd5921cea4de8c26b08f0d601f3097550a7e8af7b00f111

    SHA512

    d39d0913975ca2f8d585b72667d76de09ce7817f6de26ef21a8b62edc25d7fab39785f036992d19ca5700f5fc2ee377e696142c41529f23f503e8eefff393144

  • C:\Windows\SysWOW64\DEGYGN\QHR.004

    Filesize

    1KB

    MD5

    f3577c9b1715bb0ea307796e9c434e09

    SHA1

    737c1880cf5142a1bc0a9be4dda0b193a4dd85f4

    SHA256

    fb680f57a82fa62c6ca6109c540f0a30f9b7c1560f7ec92ae9417634d90ddd92

    SHA512

    8cb544a3ea4ff1e505c9f78313141dfbd901394ae482a91477ad828236cc6561cc8cf5c7b7d8d13c787b34a7047cc191b9ec26961957ce73d3ee879801f4de25

  • \Windows\SysWOW64\DEGYGN\QHR.exe

    Filesize

    1.5MB

    MD5

    9ab9b7b74790b7bb2798dd2b26f4a913

    SHA1

    e8ffa981a0149aa6441dcb0dd42f7baf6eb773a2

    SHA256

    df1c8d608ebd300889cf21c3bda6d5dd2574d68e1f530cc5a885449a22177a75

    SHA512

    ffffe21d8cc244aacaaba2eb13cc77ad800a196ecf6f77637a8a1f6d456cabb8331970ab358ab21dcf9832343379b4f0486da3990d45eb2f2765e55b7404739e

  • memory/2816-15-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2816-17-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.