Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
fc751a15219828b9113b4e65e0c297f8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc751a15219828b9113b4e65e0c297f8_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
Uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Uninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
register.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
register.exe
Resource
win10v2004-20240412-en
General
-
Target
Uninstall.exe
-
Size
50KB
-
MD5
1c185f9c6a1f965a6396f9f31c6171fe
-
SHA1
09063d7724a1cd17a3eb4cc228ca3e5cfad8a98b
-
SHA256
f87b53085983c75bf3287763cc547558d2355565b47c640db2959d2ad0273475
-
SHA512
0ee85caf6c4484c74191180e640cf243a9688e3475ed923be8851d66444c0e2b852feb78b8668dcf469283868dd3ac44666ba879cc1296f80fbee3982598bbf4
-
SSDEEP
768:cxiph+mxirdR6y5wmp+USVq+U5wR3E9ZJt9GSFS6sWkJv+eJRn5Am6kRRJ2iZ3i0:wAdSRwm/V4skJmqAELVigLilqGVvA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4268 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
resource yara_rule behavioral6/files/0x0008000000023271-3.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4876 wrote to memory of 4268 4876 Uninstall.exe 89 PID 4876 wrote to memory of 4268 4876 Uninstall.exe 89 PID 4876 wrote to memory of 4268 4876 Uninstall.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4312 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:1144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD51c185f9c6a1f965a6396f9f31c6171fe
SHA109063d7724a1cd17a3eb4cc228ca3e5cfad8a98b
SHA256f87b53085983c75bf3287763cc547558d2355565b47c640db2959d2ad0273475
SHA5120ee85caf6c4484c74191180e640cf243a9688e3475ed923be8851d66444c0e2b852feb78b8668dcf469283868dd3ac44666ba879cc1296f80fbee3982598bbf4