Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
318b2c9f1c8...18.exe
windows7-x64
718b2c9f1c8...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3114la.exe
windows7-x64
1114la.exe
windows10-2004-x64
3115br.exe
windows7-x64
6115br.exe
windows10-2004-x64
6html/404error.html
windows7-x64
1html/404error.html
windows10-2004-x64
1html/config.html
windows7-x64
1html/config.html
windows10-2004-x64
1html/error.html
windows7-x64
1html/error.html
windows10-2004-x64
1html/last.html
windows7-x64
1html/last.html
windows10-2004-x64
1html/start.html
windows7-x64
1html/start.html
windows10-2004-x64
1html/stati...est.js
windows7-x64
3html/stati...est.js
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 03:58
Static task
static1
Behavioral task
behavioral1
Sample
18b2c9f1c8d5b803a596fea995b15b4d_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
18b2c9f1c8d5b803a596fea995b15b4d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
114la.exe
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
114la.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
115br.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
115br.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
html/404error.html
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
html/404error.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
html/config.html
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
html/config.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
html/error.html
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
html/error.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
html/last.html
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
html/last.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
html/start.html
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
html/start.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
html/static/js/suggest.js
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
html/static/js/suggest.js
Resource
win10v2004-20240508-en
General
-
Target
115br.exe
-
Size
1.6MB
-
MD5
4cd4cfb9ad069a18d834803ef4d36ceb
-
SHA1
61c29a5e4d201e8ff9539404d3005e5581fe6bff
-
SHA256
2f220204af41b0556a327887c7b66ce3f560de81ce2aed84f132408a50274095
-
SHA512
6e1e079b9941dc7beba5cba2ce92a7689862b0a548170ca31e9b961d7119ae1d2f409163e709551a61201174244dbde7119441d58befde09e403bcb1e773209b
-
SSDEEP
24576:waZEBO/8Iv+slDbDPbrhIBoldgOJaEGHTchNGgU3Oycyz9O8VFuuzgfCAHZ:wXk8I9hOE4QNGgU3Oyc29Oy7zgfCA5
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 115br.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\115br.exe = "0" 115br.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING 115br.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\115br.exe = "0" 115br.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 115br.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1200 115br.exe Token: SeIncBasePriorityPrivilege 1200 115br.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5e2d271313680bc6861946c5f6fcc6913
SHA1752b453e6b908c94fd48d6bf6407e551c77af85d
SHA256f4923728eae1167d79f8415e45455c84f3420d108152da3745381372a69c912d
SHA51214f1252bbffc4891399fa620a5c1b067ad461bcd968494eb8369dfed2f710ba9b00b78dce6d4266b68f6bc255d90ba2d8a2d3fda28e4d43ba3215f29942d47e4