Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
302b8abad47...18.exe
windows7-x64
702b8abad47...18.exe
windows10-2004-x64
7$0/uninstall.exe
windows7-x64
7$0/uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$0/zwankysearch.dll
windows7-x64
1$0/zwankysearch.dll
windows10-2004-x64
1$0/zwankysearch.exe
windows7-x64
1$0/zwankysearch.exe
windows10-2004-x64
1$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 04:14
Static task
static1
Behavioral task
behavioral1
Sample
02b8abad471036589e86b8b94d98a345_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
02b8abad471036589e86b8b94d98a345_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$0/uninstall.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$0/uninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
$0/zwankysearch.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$0/zwankysearch.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$0/zwankysearch.exe
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
$0/zwankysearch.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
General
-
Target
$0/uninstall.exe
-
Size
83KB
-
MD5
26d12a09fd0b7b3e32e93355a3a110af
-
SHA1
1e1e8772d579ae03fd6f35a7b95fe6fd384cf5a1
-
SHA256
82a1fe8e22e3e3ccb149d5bdcc8cbfec18d89dd9277b909e725faed309165487
-
SHA512
524df1ec0ad2980236601fa1abfd30451f4d3eac681ad50d12ad9b981f5c75ff7b0dab0541ad269edb5e4e653088635acb1522f1c2d8bd0816db0be11901aa56
-
SSDEEP
1536:WEkjY1zy214Qay0DGkJ7qAELVigJ83ZKRcpw/1q792sX7Ia12/DCJ:9kjAJ4dDGkJ+AI0vcuo1qRka0/s
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3032 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 836 uninstall.exe 3032 Au_.exe 3032 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
resource yara_rule behavioral3/files/0x002f00000001454e-2.dat nsis_installer_1 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3032 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 836 wrote to memory of 3032 836 uninstall.exe 28 PID 836 wrote to memory of 3032 836 uninstall.exe 28 PID 836 wrote to memory of 3032 836 uninstall.exe 28 PID 836 wrote to memory of 3032 836 uninstall.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\$0\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\$0\uninstall.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\$0\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
619B
MD5fd986d18e8dad0ea0a44efe715ef37e0
SHA18e9862f9340ae21542ed10edccb748353323d830
SHA2568b1cc4ab7207249c4d5d7db9de067a1331a997e01ccfdc9cdea7f61ef49140fc
SHA512ba55273f371bf5c034c0d40a6d8376454cd7a16660e29b1bba7571399303ff52620f3e834621d15588926343de89c902b625777137d25a7e0c9bfe844d67159c
-
Filesize
632B
MD54607fae1a93483c558d1b37056096659
SHA13d6bbbbfd30e0c915c76944b845319d0d66f4c12
SHA256100023f9b9082fbcd6110c0c11c3f83e0df0aa41d4a2b98c3925be3e1a281d17
SHA51214d05d2921e5e68b6fb88f0ffdb281bd4c0f7c96d757d3fc5692ff058e60fc2a379a5f801830db363c018e8a21b6ed5870a836e7e63ac4cc44531280bd568d48
-
Filesize
13KB
MD5d765c492c21689e3d9d61634371fd861
SHA1ac200933671ae52c9d5544d0e2e8e9144d286c83
SHA256551e6042dd494ea01549555ffc194ab9729da09058ec714eb368dd06642c9bbc
SHA5129919a9e848c8f1e26c75d0d29207571e4b86a4140bd554743d2c1f8bd7f386fe4919345b163d89a5d907fb165e435ba0ac5f6b1101713636141f156a420e2e0f
-
Filesize
10KB
MD5fe24766ba314f620d57d0cf7339103c0
SHA18641545f03f03ff07485d6ec4d7b41cbb898c269
SHA256802ef71440f662f456bed6283a5ff78066af016897fe6bfd29cac6edc2967bbd
SHA51260d36959895cebf29c4e7713e6d414980139c7aa4ed1c8c96fefb672c1263af0ce909fb409534355895649c0e8056635112efb0da2ba05694446aec2ca77e2e3
-
Filesize
83KB
MD526d12a09fd0b7b3e32e93355a3a110af
SHA11e1e8772d579ae03fd6f35a7b95fe6fd384cf5a1
SHA25682a1fe8e22e3e3ccb149d5bdcc8cbfec18d89dd9277b909e725faed309165487
SHA512524df1ec0ad2980236601fa1abfd30451f4d3eac681ad50d12ad9b981f5c75ff7b0dab0541ad269edb5e4e653088635acb1522f1c2d8bd0816db0be11901aa56