Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15/03/2025, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe
-
Size
28KB
-
MD5
76f99f639fa89fbd10386d446fcd3f48
-
SHA1
0938fe6269c232d553c0d4f16156c8cd4e7eee68
-
SHA256
88e0cae8c695fb7498042da0326664e23222ae6c6d23d1f752bd147dfd4b93aa
-
SHA512
36f88a01fa72a2e01e4fe42b23f5f4fce385ef7c7e9a7a7d18342065372cd83673ec3fb5698f84ffed1deea218dada01f3edd26702fc83fe089e341771b1b9c0
-
SSDEEP
768:QQ0FtbM5c3PXJiLAI1z1n48ViHYL+pppppp:oLkcqAG1n48Vsb/
Malware Config
Extracted
qqpass
http://www.rongshuxia.com/rss/viewart.rs?aid=1828
-
url
http://www.mxm9191.com/myrunner_up.exe
-
user_agent
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Signatures
-
Qqpass family
-
Executes dropped EXE 2 IoCs
pid Process 2052 rundll32.exe 2524 DMe.exe -
Loads dropped DLL 4 IoCs
pid Process 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe File created C:\Windows\SysWOW64\¢«.exe JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe File created C:\Windows\SysWOW64\notepad¢¬.exe JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe File created C:\Windows\SysWOW64\DMe.exe JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe File opened for modification C:\Windows\SysWOW64\DMe.exe JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\rundll32.exe JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe File opened for modification C:\Windows\system\rundll32.exe JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DMe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1742052733" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "510" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1742052733" rundll32.exe -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 2524 DMe.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 2052 rundll32.exe 2524 DMe.exe 2052 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2052 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 29 PID 2060 wrote to memory of 2052 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 29 PID 2060 wrote to memory of 2052 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 29 PID 2060 wrote to memory of 2052 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 29 PID 2060 wrote to memory of 2052 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 29 PID 2060 wrote to memory of 2052 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 29 PID 2060 wrote to memory of 2052 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 29 PID 2060 wrote to memory of 2524 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 31 PID 2060 wrote to memory of 2524 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 31 PID 2060 wrote to memory of 2524 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 31 PID 2060 wrote to memory of 2524 2060 JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- System Location Discovery: System Language Discovery
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2052
-
-
C:\Windows\SysWOW64\DMe.exe"C:\Windows\system32\DMe.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76f99f639fa89fbd10386d446fcd3f48.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
28KB
MD554e7605a8579e295ed46ad9bb63e0d8f
SHA1279eec4836ea3051daff18996bf3f88e3a7c6f16
SHA25669b918c66e0cd1bb82e016a0c29c4d85765feab7ee17688f2f36e335ab7e8081
SHA512751cf815e18c77ec391613799f860af2483569f035c7e1e84b1c97315534b8c80486064b3ec1c3b505b241ed4631d3762b77ba600b34e0a156a68d7f8eac1cc4
-
Filesize
28KB
MD576f99f639fa89fbd10386d446fcd3f48
SHA10938fe6269c232d553c0d4f16156c8cd4e7eee68
SHA25688e0cae8c695fb7498042da0326664e23222ae6c6d23d1f752bd147dfd4b93aa
SHA51236f88a01fa72a2e01e4fe42b23f5f4fce385ef7c7e9a7a7d18342065372cd83673ec3fb5698f84ffed1deea218dada01f3edd26702fc83fe089e341771b1b9c0