Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2025, 15:32

General

  • Target

    JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe

  • Size

    28KB

  • MD5

    76f99f639fa89fbd10386d446fcd3f48

  • SHA1

    0938fe6269c232d553c0d4f16156c8cd4e7eee68

  • SHA256

    88e0cae8c695fb7498042da0326664e23222ae6c6d23d1f752bd147dfd4b93aa

  • SHA512

    36f88a01fa72a2e01e4fe42b23f5f4fce385ef7c7e9a7a7d18342065372cd83673ec3fb5698f84ffed1deea218dada01f3edd26702fc83fe089e341771b1b9c0

  • SSDEEP

    768:QQ0FtbM5c3PXJiLAI1z1n48ViHYL+pppppp:oLkcqAG1n48Vsb/

Malware Config

Extracted

Family

qqpass

C2

http://www.rongshuxia.com/rss/viewart.rs?aid=1828

Attributes
  • url

    http://www.mxm9191.com/myrunner_up.exe

  • user_agent

    Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)

Signatures

  • QQpass

    QQpass is a trojan written in C++..

  • Qqpass family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2052
    • C:\Windows\SysWOW64\DMe.exe
      "C:\Windows\system32\DMe.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    28KB

    MD5

    54e7605a8579e295ed46ad9bb63e0d8f

    SHA1

    279eec4836ea3051daff18996bf3f88e3a7c6f16

    SHA256

    69b918c66e0cd1bb82e016a0c29c4d85765feab7ee17688f2f36e335ab7e8081

    SHA512

    751cf815e18c77ec391613799f860af2483569f035c7e1e84b1c97315534b8c80486064b3ec1c3b505b241ed4631d3762b77ba600b34e0a156a68d7f8eac1cc4

  • \Windows\SysWOW64\DMe.exe

    Filesize

    28KB

    MD5

    76f99f639fa89fbd10386d446fcd3f48

    SHA1

    0938fe6269c232d553c0d4f16156c8cd4e7eee68

    SHA256

    88e0cae8c695fb7498042da0326664e23222ae6c6d23d1f752bd147dfd4b93aa

    SHA512

    36f88a01fa72a2e01e4fe42b23f5f4fce385ef7c7e9a7a7d18342065372cd83673ec3fb5698f84ffed1deea218dada01f3edd26702fc83fe089e341771b1b9c0

  • memory/2052-80-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2052-77-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2052-85-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2052-84-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2052-83-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2052-32-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2052-82-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2052-75-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2052-76-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2052-81-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2052-78-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2052-79-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2060-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2060-20-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2060-31-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/2060-30-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2524-27-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2524-29-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB