Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
31beebba385...18.exe
windows7-x64
31beebba385...18.exe
windows10-2004-x64
3ExeStealthGUI.exe
windows7-x64
3ExeStealthGUI.exe
windows10-2004-x64
3Stealth-Help.rtf
windows7-x64
4Stealth-Help.rtf
windows10-2004-x64
1helpstealth.htm
windows7-x64
1helpstealth.htm
windows10-2004-x64
1uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
41s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 17:47
Static task
static1
Behavioral task
behavioral1
Sample
1beebba38507c0c80fad9310a3976ff7_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1beebba38507c0c80fad9310a3976ff7_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
ExeStealthGUI.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
ExeStealthGUI.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Stealth-Help.rtf
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Stealth-Help.rtf
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
helpstealth.htm
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
helpstealth.htm
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
uninstall.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uninstall.exe
Resource
win10v2004-20240508-en
General
-
Target
uninstall.exe
-
Size
35KB
-
MD5
61fb98cf034f0d1346b1c479772025c1
-
SHA1
a2e350516f7daefb2cc22b91a943aedc997844f2
-
SHA256
1dbf3b815618f4ab01145607683535e4f8cbe5b7d55b4f15516a88ac8e7d5f4a
-
SHA512
a99db3d8f2e6c0ea216ef689d34a715f78c55fc9357124efb0502b6f2cd5b35758cdbd596c22d285e70e43cd914f4c333ca9529dc12c441f7ebe517458e8637c
-
SSDEEP
768:/1cVhpQI2EQK0iPDh84nScF15GYbWjXO3XJ9JRnqQe:NQpQ5EP0ijnRTXJQQe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1924 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral10/files/0x00070000000233f4-5.dat nsis_installer_1 behavioral10/files/0x00070000000233f4-5.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3752 wrote to memory of 1924 3752 uninstall.exe 80 PID 3752 wrote to memory of 1924 3752 uninstall.exe 80 PID 3752 wrote to memory of 1924 3752 uninstall.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
PID:1924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD561fb98cf034f0d1346b1c479772025c1
SHA1a2e350516f7daefb2cc22b91a943aedc997844f2
SHA2561dbf3b815618f4ab01145607683535e4f8cbe5b7d55b4f15516a88ac8e7d5f4a
SHA512a99db3d8f2e6c0ea216ef689d34a715f78c55fc9357124efb0502b6f2cd5b35758cdbd596c22d285e70e43cd914f4c333ca9529dc12c441f7ebe517458e8637c