Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
334744a5749...18.exe
windows7-x64
734744a5749...18.exe
windows10-2004-x64
7$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3uninstall.exe
windows7-x64
8uninstall.exe
windows10-2004-x64
8$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3vbs.vbs
windows7-x64
1vbs.vbs
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 11:53
Static task
static1
Behavioral task
behavioral1
Sample
34744a5749315d0cefc2a57759a5c7c1_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
34744a5749315d0cefc2a57759a5c7c1_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
uninstall.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
uninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
vbs.vbs
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
vbs.vbs
Resource
win10v2004-20240426-en
General
-
Target
uninstall.exe
-
Size
38KB
-
MD5
0cddde4152eb66c33077cb0cca09bd27
-
SHA1
f7238a6b1e08ce3fbf6cf18cb7ca8b20f4bc376f
-
SHA256
f85d6144303a2e8faf9253cd61070895fa3af04db656703990d0f1404d6d494a
-
SHA512
18f8064128388a382651c913add2b414d81af558acb5ed070b78b0751129e25d31b78ea2758097097618c41735c2876c7e3b490a19108a3840173ba5371c01b9
-
SSDEEP
768:cnHmFZIFRQp8lDhdQLErWV/AVHxI0Z0D32uInmyd0csJRnopdw:+HYMiClDhdyA5x5Z0Dvyec/p+
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts Un_A.exe -
Deletes itself 1 IoCs
pid Process 2620 Un_A.exe -
Executes dropped EXE 1 IoCs
pid Process 2620 Un_A.exe -
Loads dropped DLL 2 IoCs
pid Process 2312 uninstall.exe 2620 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral7/files/0x002e000000015d24-2.dat nsis_installer_1 behavioral7/files/0x002e000000015d24-2.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2620 2312 uninstall.exe 28 PID 2312 wrote to memory of 2620 2312 uninstall.exe 28 PID 2312 wrote to memory of 2620 2312 uninstall.exe 28 PID 2312 wrote to memory of 2620 2312 uninstall.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Drops file in Drivers directory
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5dada3e1836af78d5b24499da252d01e4
SHA1d2a1c25405e3c74973cf18dec2c7138df9e96a83
SHA2560073337816509851476c2cc154f471a3e3a1a2806b97c363870acc09a30a5ed7
SHA512f8bda8413dadb00a644341da5e076f203a3134daaefd2961fa0341f5a533eee28582ce9872354ead698bb1275ee7726fa574267e909a3e2f977908392e7a5c66
-
Filesize
38KB
MD50cddde4152eb66c33077cb0cca09bd27
SHA1f7238a6b1e08ce3fbf6cf18cb7ca8b20f4bc376f
SHA256f85d6144303a2e8faf9253cd61070895fa3af04db656703990d0f1404d6d494a
SHA51218f8064128388a382651c913add2b414d81af558acb5ed070b78b0751129e25d31b78ea2758097097618c41735c2876c7e3b490a19108a3840173ba5371c01b9