Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
362a3384531...18.exe
windows7-x64
1062a3384531...18.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 08:20
Static task
static1
Behavioral task
behavioral1
Sample
62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
Uninstall.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240426-en
General
-
Target
Uninstall.exe
-
Size
54KB
-
MD5
cafdc399426afcb8523a207cb5496f4e
-
SHA1
5bcd97c6d36757bce8329af3f7deefff6677d138
-
SHA256
f86eb5b330384114bb42d127403b4756987a9a87deb277c376f8d7e95717e449
-
SHA512
d12cb75a35c6aa1ed401e3168777aca50de41c90a0f92570552ec177054ffb5ce90412c0a77c4e5950684820f57365d19dca1ab72b7f8114817ffb25a26523de
-
SSDEEP
1536:vaLuXE8XPIYyr7jvN0DoJ+cngdLeAyNx5UaLVel:SLuXzXwYyr6DoocnceAQUkVel
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4032 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral10/files/0x0007000000023437-3.dat nsis_installer_1 behavioral10/files/0x0007000000023437-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2808 wrote to memory of 4032 2808 Uninstall.exe 82 PID 2808 wrote to memory of 4032 2808 Uninstall.exe 82 PID 2808 wrote to memory of 4032 2808 Uninstall.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
PID:4032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5cafdc399426afcb8523a207cb5496f4e
SHA15bcd97c6d36757bce8329af3f7deefff6677d138
SHA256f86eb5b330384114bb42d127403b4756987a9a87deb277c376f8d7e95717e449
SHA512d12cb75a35c6aa1ed401e3168777aca50de41c90a0f92570552ec177054ffb5ce90412c0a77c4e5950684820f57365d19dca1ab72b7f8114817ffb25a26523de