Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3088a5597c2...18.exe
windows7-x64
7088a5597c2...18.exe
windows10-2004-x64
7$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...AC.dll
windows7-x64
1$PLUGINSDI...AC.dll
windows10-2004-x64
1$PLUGINSDI....0.dll
windows7-x64
1$PLUGINSDI....0.dll
windows10-2004-x64
1$PLUGINSDI...VC.dll
windows7-x64
1$PLUGINSDI...VC.dll
windows10-2004-x64
1$PLUGINSDI...np.dll
windows7-x64
3$PLUGINSDI...np.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...us.dll
windows7-x64
3$PLUGINSDI...us.dll
windows10-2004-x64
3$PLUGINSDI...CE.dll
windows7-x64
1$PLUGINSDI...CE.dll
windows10-2004-x64
1$PLUGINSDI...el.dll
windows7-x64
1$PLUGINSDI...el.dll
windows10-2004-x64
1$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDIR/Live.dll
windows7-x64
1$PLUGINSDIR/Live.dll
windows10-2004-x64
1$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...le.dll
windows7-x64
1$PLUGINSDI...le.dll
windows10-2004-x64
1$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDIR/PPAP.exe
windows7-x64
1$PLUGINSDIR/PPAP.exe
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
088a5597c25de7da7946d6475c41c42b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
088a5597c25de7da7946d6475c41c42b_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/CommonFuncDll.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/CommonFuncDll.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/CoreAAC.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/CoreAAC.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/CoreAVC.2.0.0.0.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/CoreAVC.2.0.0.0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/CoreAVC.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/CoreAVC.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/FWUpnp.dll
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/FWUpnp.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/GdiPlus.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/GdiPlus.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/HTTP_ASF_SOURCE.dll
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/HTTP_ASF_SOURCE.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/Hookkernel.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/Hookkernel.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/Live.dll
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/Live.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/MP4Splitter.dll
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/MP4Splitter.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/MngModule.dll
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/MngModule.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/OPlayer.dll
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/OPlayer.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/PPAP.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/PPAP.exe
Resource
win10v2004-20240508-en
General
-
Target
$PLUGINSDIR/CoreAVC.dll
-
Size
181KB
-
MD5
c264fed121afd44bda8bf0ff8f4e4269
-
SHA1
7480a3b26b81045a1504e68e15225682bcc6f440
-
SHA256
cb8d9d80dcd48d9a9e3d87c847c47125f7201a98fb5abb4bd6c443322071b951
-
SHA512
99ed4b723b2b7a90fce8e9bf9ee8d5a1440c4d569638ff6a1aa59354c8bca91618a13c440f754fad3ae22c306709da35b4c53b8a00a09753027eaed0d238052b
-
SSDEEP
3072:eFX0fCcmjZvyTdndzMryzKdvYQ/5c0q3ARsK/l74obxK7Dtp0XRHSOg9lX9cWR82:GEKpZY2r3VYQ/c0d7Hbw7pp0X8hlX6WB
Malware Config
Signatures
-
Modifies registry class 19 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{345CAA15-4F12-4A28-AFE9-383625563A83}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\$PLUGINSDIR\\CoreAVC.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{09571A4B-F1FE-4C60-9760-DE6D310C7C31} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{09571A4B-F1FE-4C60-9760-DE6D310C7C31} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{09571A4B-F1FE-4C60-9760-DE6D310C7C31}\ = "CoreAVC Video Decoder" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F23B1F18-CB1A-47ED-A1FE-B60494A626D0}\ = "CoreAVC Video Decoder Info" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F23B1F18-CB1A-47ED-A1FE-B60494A626D0}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F23B1F18-CB1A-47ED-A1FE-B60494A626D0}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\$PLUGINSDIR\\CoreAVC.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{345CAA15-4F12-4A28-AFE9-383625563A83} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{09571A4B-F1FE-4C60-9760-DE6D310C7C31}\FriendlyName = "CoreAVC Video Decoder" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{09571A4B-F1FE-4C60-9760-DE6D310C7C31}\CLSID = "{09571A4B-F1FE-4C60-9760-DE6D310C7C31}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{09571A4B-F1FE-4C60-9760-DE6D310C7C31}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{09571A4B-F1FE-4C60-9760-DE6D310C7C31}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\$PLUGINSDIR\\CoreAVC.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F23B1F18-CB1A-47ED-A1FE-B60494A626D0}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{345CAA15-4F12-4A28-AFE9-383625563A83}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{09571A4B-F1FE-4C60-9760-DE6D310C7C31}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F23B1F18-CB1A-47ED-A1FE-B60494A626D0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{345CAA15-4F12-4A28-AFE9-383625563A83}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{345CAA15-4F12-4A28-AFE9-383625563A83}\ = "CoreAVC Video Decoder About" regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{09571A4B-F1FE-4C60-9760-DE6D310C7C31}\FilterData = 02000000000260000200000000000000307069330000000000000000070000000000000000000000307479330000000000010000100100003174793300000000000100002001000032747933000000000001000030010000337479330000000000010000400100003474793300000000000100005001000035747933000000000001000060010000367479330000000000010000700100003170693308000000000000000500000000000000000000003074793300000000000100008001000031747933000000000001000090010000327479330000000000010000a0010000337479330000000000010000b0010000347479330000000000010000c00100007669647300001000800000aa00389b714156433100001000800000aa00389b714832363400001000800000aa00389b716832363400001000800000aa00389b715832363400001000800000aa00389b717832363400001000800000aa00389b715653534800001000800000aa00389b716176633100001000800000aa00389b715956313200001000800000aa00389b714959555600001000800000aa00389b714934323000001000800000aa00389b715955593200001000800000aa00389b7100000000000000000000000000000000 regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1664 2348 regsvr32.exe 28 PID 2348 wrote to memory of 1664 2348 regsvr32.exe 28 PID 2348 wrote to memory of 1664 2348 regsvr32.exe 28 PID 2348 wrote to memory of 1664 2348 regsvr32.exe 28 PID 2348 wrote to memory of 1664 2348 regsvr32.exe 28 PID 2348 wrote to memory of 1664 2348 regsvr32.exe 28 PID 2348 wrote to memory of 1664 2348 regsvr32.exe 28