Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
30bd30f42b1...18.exe
windows7-x64
70bd30f42b1...18.exe
windows10-2004-x64
7$PLUGINSDI...ge.dll
windows7-x64
1$PLUGINSDI...ge.dll
windows10-2004-x64
1$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...dt.dll
windows7-x64
1$PLUGINSDI...dt.dll
windows10-2004-x64
17za.exe
windows7-x64
17za.exe
windows10-2004-x64
1ChineseChess.exe
windows7-x64
3ChineseChess.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...dt.dll
windows7-x64
1$PLUGINSDI...dt.dll
windows10-2004-x64
1aminstall.dll
windows7-x64
1aminstall.dll
windows10-2004-x64
3Components...s.html
windows7-x64
1Components...s.html
windows10-2004-x64
1eula.rtf
windows7-x64
4eula.rtf
windows10-2004-x64
1readme.rtf
windows7-x64
4readme.rtf
windows10-2004-x64
1Analysis
-
max time kernel
139s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
0bd30f42b1f803e0e87a8f5eda092604_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0bd30f42b1f803e0e87a8f5eda092604_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgImage.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgImage.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
7za.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
7za.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
ChineseChess.exe
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
ChineseChess.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
Uninstall.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
Uninstall.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
aminstall.dll
Resource
win7-20240419-en
Behavioral task
behavioral26
Sample
aminstall.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
Components/ChineseChess.html
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
Components/ChineseChess.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
eula.rtf
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
eula.rtf
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
readme.rtf
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
readme.rtf
Resource
win10v2004-20240611-en
General
-
Target
Uninstall.exe
-
Size
88KB
-
MD5
e10da989e7299ad0a37591649a676881
-
SHA1
66494a8c3093e9a4a6026c2ad29615c8f8be1a1c
-
SHA256
fa5493c2c562c3431083155b9184d6e5ca54307f550fa03863eebb409ed339ae
-
SHA512
7fa1e6b829024439377813f54ce0bda1be3858df525d83293f6065fe783fca2fcac8c74d3d6e08665ebc258aeb5764f24f18f1b2dc75fe061e459d15695c7d39
-
SSDEEP
1536:Rt/XUS3ZQ9h5f90D5kJWHR83dIWXwyNLIAW35pSkeVS9XaxIdPar:R1mh5CD5kJAR8zXnLIA8p3eVS9Xu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1996 Au_.exe -
Loads dropped DLL 2 IoCs
pid Process 1996 Au_.exe 1996 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
resource yara_rule behavioral18/files/0x00070000000233f8-4.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3836 wrote to memory of 1996 3836 Uninstall.exe 83 PID 3836 wrote to memory of 1996 3836 Uninstall.exe 83 PID 3836 wrote to memory of 1996 3836 Uninstall.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD53c19f79ce11facc2fc4d3351dbb263e0
SHA117f4bf4b18ea7700f70ac7d825dc997be0d25f71
SHA256cfaba712ad640ce2b4890005ffcf03ed9e2a18a6cf9075295f3aaea1478896b9
SHA51205c9ac861e4fed610171fcb5fad40abc30cbf90e9c7cb13c758f52cdff568af0fdd6af968db4fb143a748c77f21c353c7cffea28cbcbd2ad17157038ab490273
-
Filesize
10KB
MD5725145e8caa39635cab9899c47c72eda
SHA130478c907551bd920bf359638b091fc5c10b5a53
SHA2561759e4f7777fb8c9ed356a7d4dc237a90e0760061685d44ea02d40ca9e359ceb
SHA512de31286ea10321f762a3b6e7c6c82177d5b6f45a82adc936fcbbc23105708cbbbec903ba94ba94e7723e80f1828393e5395ef575b37136b19de7535e74e24547
-
Filesize
619B
MD59e8e5f826d612788077b83f9e75a7cfd
SHA176caafdaabe1dac8165ec964da8877b18d1bea1f
SHA256f31457d01daebb6b25f85ffde0205c2f8734aa9062de241457b70f808425bb09
SHA512eec28118123e1540257ddb2f90550b85d8422c69f1d21c742b8f27b573a664ea22063cce870d65a3da1406f1931b90a19b28a700710f47b1f374e193c9343918
-
Filesize
88KB
MD5e10da989e7299ad0a37591649a676881
SHA166494a8c3093e9a4a6026c2ad29615c8f8be1a1c
SHA256fa5493c2c562c3431083155b9184d6e5ca54307f550fa03863eebb409ed339ae
SHA5127fa1e6b829024439377813f54ce0bda1be3858df525d83293f6065fe783fca2fcac8c74d3d6e08665ebc258aeb5764f24f18f1b2dc75fe061e459d15695c7d39