Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
724bd3998ed...18.exe
windows7-x64
724bd3998ed...18.exe
windows10-2004-x64
7$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMPImg/C...04.exe
windows7-x64
1$TEMPImg/C...04.exe
windows10-2004-x64
1$TEMPImg/regver.exe
windows7-x64
1$TEMPImg/regver.exe
windows10-2004-x64
1DataDiskDoctor.exe
windows7-x64
7DataDiskDoctor.exe
windows10-2004-x64
7Uninst.exe
windows7-x64
7Uninst.exe
windows10-2004-x64
7$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 05:09
Behavioral task
behavioral1
Sample
24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$TEMPImg/CheckVer104.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$TEMPImg/CheckVer104.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
$TEMPImg/regver.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
$TEMPImg/regver.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
DataDiskDoctor.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
DataDiskDoctor.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Uninst.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
Uninst.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20240508-en
General
-
Target
Uninst.exe
-
Size
63KB
-
MD5
ad427ce4868d384742752be8821d0b94
-
SHA1
1d584543ba7daab3370c79a65e6df46e2b245c18
-
SHA256
ffff9b4571898daf60a7a8404507f240659cae14d07d8d80977af75f920f8e2a
-
SHA512
e60de0ac9400e4c6b31c6511096490e176b239b92a796796dc6c73c1c904f7adcea9482b94d12040d87ca97ef3c4355d6389362c960915b6833f46f39722589f
-
SSDEEP
1536:PLXB65939tY6HBg4sXJ6jkzHE/1s2SXiMl5Dovxj+h3:PLk395hYXJnE9s2giM0vxj+h3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1788 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 1788 Au_.exe -
Loads dropped DLL 5 IoCs
pid Process 1984 Uninst.exe 1788 Au_.exe 1788 Au_.exe 1788 Au_.exe 1788 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral13/files/0x0031000000015d39-2.dat nsis_installer_1 behavioral13/files/0x0031000000015d39-2.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1788 Au_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1788 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1788 1984 Uninst.exe 29 PID 1984 wrote to memory of 1788 1984 Uninst.exe 29 PID 1984 wrote to memory of 1788 1984 Uninst.exe 29 PID 1984 wrote to memory of 1788 1984 Uninst.exe 29 PID 1984 wrote to memory of 1788 1984 Uninst.exe 29 PID 1984 wrote to memory of 1788 1984 Uninst.exe 29 PID 1984 wrote to memory of 1788 1984 Uninst.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninst.exe"C:\Users\Admin\AppData\Local\Temp\Uninst.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD52cfba79d485cf441c646dd40d82490fc
SHA183e51ac1115a50986ed456bd18729653018b9619
SHA25686b302fa9c85dfa0c1c03ba000864a928365dab571f3355347dba02da22949b7
SHA512cca186a7f9c5cff3f4eca410fbe8cc13dad2514a7e36aec9b1addfbcb239ace9b9b2d8427771858e3fd11783abce7e24d43c286f98da9f8b17562ca095a4c043
-
Filesize
63KB
MD5ad427ce4868d384742752be8821d0b94
SHA11d584543ba7daab3370c79a65e6df46e2b245c18
SHA256ffff9b4571898daf60a7a8404507f240659cae14d07d8d80977af75f920f8e2a
SHA512e60de0ac9400e4c6b31c6511096490e176b239b92a796796dc6c73c1c904f7adcea9482b94d12040d87ca97ef3c4355d6389362c960915b6833f46f39722589f