Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
70b456d5ab3...18.exe
windows7-x64
10b456d5ab3...18.exe
windows10-2004-x64
1$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3QQTMAC06SF.exe
windows7-x64
6QQTMAC06SF.exe
windows10-2004-x64
1Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7hook.dll
windows7-x64
1hook.dll
windows10-2004-x64
1Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 23:31
Behavioral task
behavioral1
Sample
0b456d5ab382efe1110d034c75846a41_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0b456d5ab382efe1110d034c75846a41_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
QQTMAC06SF.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
QQTMAC06SF.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
hook.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
hook.dll
Resource
win10v2004-20240226-en
General
-
Target
hook.dll
-
Size
263KB
-
MD5
076086e7cab7e84d10959486375bdd62
-
SHA1
d9e758e270cca95c6850e6ce756a0159238301d8
-
SHA256
8214099df804c0a0c4f544da3ff5b76ed96293d63248335d9bdbacbf500c1e37
-
SHA512
7c21bca0e64732776ae8036d8a0cbc4b0fe53df9482d459c068ed4c3e0ce679c93c98bd9ef651e48ceb35d4fc804be79bc1b617219e70e89e77a6da1efce5f3d
-
SSDEEP
6144:beOi9WBv7KlOfCW3essjKMOma934QsM/5HM/ligKlRJK:beOiIBvaOddsbQN/iNklnK
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2512 wrote to memory of 1284 2512 rundll32.exe 91 PID 2512 wrote to memory of 1284 2512 rundll32.exe 91 PID 2512 wrote to memory of 1284 2512 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\hook.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\hook.dll,#12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4352 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:81⤵PID:4208