Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
70b456d5ab3...18.exe
windows7-x64
10b456d5ab3...18.exe
windows10-2004-x64
1$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3QQTMAC06SF.exe
windows7-x64
6QQTMAC06SF.exe
windows10-2004-x64
1Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7hook.dll
windows7-x64
1hook.dll
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 23:31
Behavioral task
behavioral1
Sample
0b456d5ab382efe1110d034c75846a41_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0b456d5ab382efe1110d034c75846a41_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
QQTMAC06SF.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
QQTMAC06SF.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
hook.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
hook.dll
Resource
win10v2004-20240226-en
General
-
Target
Uninstall.exe
-
Size
47KB
-
MD5
2cb8a99eb1df0d62608298575086d5b0
-
SHA1
f8b7416417116875b1586ddcad4719a642569835
-
SHA256
86b244db700feb64c8d96803be623d171b1ccb5b0bda22fc8b88fdca777598f0
-
SHA512
d074729f99135685507f88aa64a99afff2cd96e3d252ab5612fd73b32ec3ce8e2d1a38b4e7c025d6c0a0444dab18cf6b0d64119cd5c24dfbf0472a9fb29ae065
-
SSDEEP
768:gG0D3L09yOJRZHR8Wm8REzAwtbTBu4VVhG5b5PIAIYHLLE8JC+eJRn5Am6kRRJ2Z:gG0Db1wJdBREzA01xVubM8J5qAELVigu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1292 A~NSISu_.exe -
Loads dropped DLL 4 IoCs
pid Process 2228 Uninstall.exe 1292 A~NSISu_.exe 1292 A~NSISu_.exe 1292 A~NSISu_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral7/files/0x000c000000012294-2.dat nsis_installer_1 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1292 A~NSISu_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2228 wrote to memory of 1292 2228 Uninstall.exe 28 PID 2228 wrote to memory of 1292 2228 Uninstall.exe 28 PID 2228 wrote to memory of 1292 2228 Uninstall.exe 28 PID 2228 wrote to memory of 1292 2228 Uninstall.exe 28 PID 2228 wrote to memory of 1292 2228 Uninstall.exe 28 PID 2228 wrote to memory of 1292 2228 Uninstall.exe 28 PID 2228 wrote to memory of 1292 2228 Uninstall.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe"C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1292
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD52cb8a99eb1df0d62608298575086d5b0
SHA1f8b7416417116875b1586ddcad4719a642569835
SHA25686b244db700feb64c8d96803be623d171b1ccb5b0bda22fc8b88fdca777598f0
SHA512d074729f99135685507f88aa64a99afff2cd96e3d252ab5612fd73b32ec3ce8e2d1a38b4e7c025d6c0a0444dab18cf6b0d64119cd5c24dfbf0472a9fb29ae065