Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3043b25942f...18.exe
windows7-x64
7043b25942f...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
37za.exe
windows7-x64
17za.exe
windows10-2004-x64
1Uninstaller.exe
windows7-x64
7Uninstaller.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 03:01
Static task
static1
Behavioral task
behavioral1
Sample
043b25942fb2b7cb9ddf6684816d7579_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
043b25942fb2b7cb9ddf6684816d7579_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
7za.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
7za.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
Uninstaller.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Uninstaller.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240426-en
General
-
Target
Uninstaller.exe
-
Size
307KB
-
MD5
69eb0fada0246cd3c14f4ed7e013f1ae
-
SHA1
ee931af7b20bdbca933aa940bcbe41c5660c4ff6
-
SHA256
082e2d84c44fd03c5ca3a0644e7078879a3442c27464034e54bbd372e78596fb
-
SHA512
837fe569c745cf36b99d684e520233f1e713c08aa8947d0be53fe9a9a92acc5969b92e92f89ca3efee6f53d6c2cdbe9989b658b7dd43521a2439310b0ba45563
-
SSDEEP
6144:jQ3U77Vo6xnM3DoFFjuvf/toNQ8dqLuJoU0U7Hd8CntQOHHM+HFFTjXdpNnT2yB:977DnM3D0Fw/tN8dkmLtpHHHrh7TB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2200 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 2020 Uninstaller.exe 2200 Au_.exe 2200 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral11/files/0x0026000000015c3c-6.dat nsis_installer_1 behavioral11/files/0x0026000000015c3c-6.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2200 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2200 2020 Uninstaller.exe 28 PID 2020 wrote to memory of 2200 2020 Uninstaller.exe 28 PID 2020 wrote to memory of 2200 2020 Uninstaller.exe 28 PID 2020 wrote to memory of 2200 2020 Uninstaller.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstaller.exe"C:\Users\Admin\AppData\Local\Temp\Uninstaller.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD569eb0fada0246cd3c14f4ed7e013f1ae
SHA1ee931af7b20bdbca933aa940bcbe41c5660c4ff6
SHA256082e2d84c44fd03c5ca3a0644e7078879a3442c27464034e54bbd372e78596fb
SHA512837fe569c745cf36b99d684e520233f1e713c08aa8947d0be53fe9a9a92acc5969b92e92f89ca3efee6f53d6c2cdbe9989b658b7dd43521a2439310b0ba45563
-
Filesize
10KB
MD57fbda5b7be6256996d4e59e5f6949918
SHA12d36c0e0bfbe450675c6ed044e715abaa85a252a
SHA2569bb31f7f02231e3166bf52385d804c06da9740e9c6f0bda807b01052ae9fdcd4
SHA512bc0d36aa6f50041bad05cf48d909ed5a387bff5b111f657591161a288c1be5c20b8c5d69e557b5ea395726d91601b9e6303da81555e053090cfcbf5d44be7f82
-
Filesize
9KB
MD5ef2ba370973a3f8aba1533cb3858921b
SHA1c2211408f29a46fc26198cddf411694c0e7e0eb8
SHA256ed575c8bddf21cc6d689646ecfdeafe356e0f9945a282eda79f3b636b77a4453
SHA51207aac20904fb164ba91b7c619b674d5e0f4d1ec8ba03fbd7e123ef53ff4b134278e01964fb81dfcc2905b760c572a7e13c87114bdb279f1d26632ebe71c628ba