Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
79f0688568d...18.exe
windows7-x64
79f0688568d...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3GLWorker.exe
windows7-x64
10GLWorker.exe
windows10-2004-x64
10LuxorAR.exe
windows7-x64
10LuxorAR.exe
windows10-2004-x64
10Read_Me.html
windows7-x64
1Read_Me.html
windows10-2004-x64
1Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3core.dll
windows7-x64
3core.dll
windows10-2004-x64
3crash.dll
windows7-x64
5crash.dll
windows10-2004-x64
5dsetup.dll
windows7-x64
3dsetup.dll
windows10-2004-x64
3file.dll
windows7-x64
3file.dll
windows10-2004-x64
3Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 17:44
Behavioral task
behavioral1
Sample
9f0688568d98ab1b4f0a51dea14d1ac1_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9f0688568d98ab1b4f0a51dea14d1ac1_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Dialer.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Dialer.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsisdl.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsisdl.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
GLWorker.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
GLWorker.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
LuxorAR.exe
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
LuxorAR.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Read_Me.html
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Read_Me.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
Uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
core.dll
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
core.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
crash.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
crash.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
dsetup.dll
Resource
win7-20240419-en
Behavioral task
behavioral30
Sample
dsetup.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
file.dll
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
file.dll
Resource
win10v2004-20240508-en
General
-
Target
Uninstall.exe
-
Size
104KB
-
MD5
8e24e81ec36f0af96be7690081ede13d
-
SHA1
e33106e7e8d1abf7b2ec77799b5d46129149525b
-
SHA256
7492a2a9ae55c125a8534c849479fd9e46024526f22d7bdd11e43ebe4debd2cc
-
SHA512
c8ac2dbc293631a68c3d6f1de4dd49992825302cdfa53b45d87ef9063706dad43aa50d7e646b9a9157e2d2bc68dd8160c8913597df2f1fa381125ace10a02114
-
SSDEEP
3072:LCaZ2Yrb0VTXJYJmfnX3+aLYZWX3we6Z97:LCIo2sfnX3PYZwwe6Z97
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1212 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 1212 Au_.exe 1212 Au_.exe 1212 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral20/files/0x000800000002342d-3.dat nsis_installer_1 behavioral20/files/0x000800000002342d-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2808 wrote to memory of 1212 2808 Uninstall.exe 83 PID 2808 wrote to memory of 1212 2808 Uninstall.exe 83 PID 2808 wrote to memory of 1212 2808 Uninstall.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5714e0ecd29f9ec555f350f38672726c7
SHA1555b1492e782d7a30f280f2aecb64c642c1aaad3
SHA25621fea4cf18de8e25d0ffa3375699150fcd04e6d470358696f2dffdd3fc09d7f3
SHA512ced5814f25b688d1ede5a1395bcca69e1a0cba260104f156dc03de6ebb2015f6d832fed86ac234c36a10a75be33f489a63c8bd6111e3aaf4b078af1d94b00312
-
Filesize
11KB
MD5960a5c48e25cf2bca332e74e11d825c9
SHA1da35c6816ace5daf4c6c1d57b93b09a82ecdc876
SHA256484f8e9f194ed9016274ef3672b2c52ed5f574fb71d3884edf3c222b758a75a2
SHA512cc450179e2d0d56aee2ccf8163d3882978c4e9c1aa3d3a95875fe9ba9831e07ddfd377111dc67f801fa53b6f468a418f086f1de7c71e0a5b634e1ae2a67cd3da
-
Filesize
593B
MD59300b48ab9642ea7ee97bd72b4c67447
SHA1266d83ca426f63a6ad49674ee00721727c9cf6ae
SHA256ce642558e064ea6a2f8c1260bea9eacdd951ab046eae0169872cba6422733cae
SHA51257eebef6105462f02c823d6f341064ebd03355809b71cf78c85a53483803db0c69b15059c3c1930c364240ced6a2aa5ca05520534bdf3f5436e068b9c2bfa712
-
Filesize
104KB
MD58e24e81ec36f0af96be7690081ede13d
SHA1e33106e7e8d1abf7b2ec77799b5d46129149525b
SHA2567492a2a9ae55c125a8534c849479fd9e46024526f22d7bdd11e43ebe4debd2cc
SHA512c8ac2dbc293631a68c3d6f1de4dd49992825302cdfa53b45d87ef9063706dad43aa50d7e646b9a9157e2d2bc68dd8160c8913597df2f1fa381125ace10a02114