Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7077750e84f...18.exe
windows7-x64
7077750e84f...18.exe
windows10-2004-x64
7Italian!it.vbs
windows7-x64
1Italian!it.vbs
windows10-2004-x64
1Welsh!cy.vbs
windows7-x64
1Welsh!cy.vbs
windows10-2004-x64
1$DESKTOP/�...nt.exe
windows7-x64
7$DESKTOP/�...nt.exe
windows10-2004-x64
7Italian!it.vbs
windows7-x64
1Italian!it.vbs
windows10-2004-x64
1Welsh!cy.vbs
windows7-x64
1Welsh!cy.vbs
windows10-2004-x64
1$DESKTOP/�...le.exe
windows7-x64
3$DESKTOP/�...le.exe
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ce.dll
windows7-x64
3$PLUGINSDI...ce.dll
windows10-2004-x64
3$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
1$PLUGINSDI...sh.dll
windows10-2004-x64
1$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDIR/Aero.dll
windows7-x64
7$PLUGINSDIR/Aero.dll
windows10-2004-x64
7$PLUGINSDI...RL.dll
windows7-x64
3$PLUGINSDI...RL.dll
windows10-2004-x64
3$PLUGINSDI...rb.dll
windows7-x64
3$PLUGINSDI...rb.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 10:39
Behavioral task
behavioral1
Sample
077750e84f5bf5267d582995482adecc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
077750e84f5bf5267d582995482adecc_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Italian!it.vbs
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Italian!it.vbs
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
Welsh!cy.vbs
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Welsh!cy.vbs
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
$DESKTOP/Torrent Portable/App/uTorrent/uTorrent.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$DESKTOP/Torrent Portable/App/uTorrent/uTorrent.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
Italian!it.vbs
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Italian!it.vbs
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
Welsh!cy.vbs
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
Welsh!cy.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
$DESKTOP/Torrent Portable/uTorrentPortable.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$DESKTOP/Torrent Portable/uTorrentPortable.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/NewTextreplace.dll
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/NewTextreplace.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/Registry.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/Registry.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/newadvsplash.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/newadvsplash.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsisFirewall.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsisFirewall.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/Aero.dll
Resource
win7-20240215-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/Aero.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win7-20240419-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/InvokeShellVerb.dll
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/InvokeShellVerb.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240419-en
General
-
Target
$DESKTOP/Torrent Portable/App/uTorrent/uTorrent.exe
-
Size
4.9MB
-
MD5
97c2ccf6622b460d89eaa0b481610394
-
SHA1
bc6fd3319daf27dfbb2786ad35b17329665a930b
-
SHA256
a17b3463587b84d73eecf57929d111dcfba158e33f93d5d43f8b28b7e4e3267c
-
SHA512
3ff0dcf9eb9b7c237d8ed13d51b20d3e14aedb5b11db763ff070c1afcef1ee677ace6d5f7d3bd724fc4277c925a30dcdd0d0280015d8cf4c8d88fd9efe910e57
-
SSDEEP
49152:lYTEpjDUiCeD8i8aUZMOwbk+ZNTEmrVLUWvggIhbf/NobusuC99ZaTg+P2jqAtHv:lY4ui18i2aQCaQa7P2jxpL9fn9UDc
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Wine uTorrent.exe Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Wine uTorrent.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\FalconBetaAccount uTorrent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\FalconBetaAccount\remote_access_client_id = "9210734678" uTorrent.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2240 uTorrent.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2240 uTorrent.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2240 uTorrent.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$DESKTOP\Torrent Portable\App\uTorrent\uTorrent.exe"C:\Users\Admin\AppData\Local\Temp\$DESKTOP\Torrent Portable\App\uTorrent\uTorrent.exe"1⤵
- Identifies Wine through registry keys
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD59d09b7169bedba54ed39adb73e483bf8
SHA110eec1e3afd9835cbe730d84c70e3834882c6052
SHA256fa1fa68c1b8c251297721d0e77b4702338a6185f6d2ab9f49761e98739406a45
SHA512ad9a23f0b779e93da311c6b4c26fb1f44ba6abf8c1de32afa4053a185737156679d32801de921e9756e0cfc3042a69fcde2aab8154cdfdfd38a402c43db31a5a
-
Filesize
170B
MD529bbca38b538b75a2c321994bed1fed8
SHA165cf61b3660e5f845d25ae8e5dc37299c8c7f851
SHA256ea377ddae6728c3d79d17112b8b9fb2ac0d552834bdeb1c0fc63cf7f1cb43ba6
SHA512bd741c34f6cc06b329093e5522bd57d7430117ff452575699bed02ccd5bcadb50ef79b0c08e527d2309d9c66aceef20c20ee303b042f4d6faa9f5b14add11eb6