Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
33f50e640e4...18.exe
windows7-x64
73f50e640e4...18.exe
windows10-2004-x64
7$PLUGINSDI...ol.dll
windows7-x64
3$PLUGINSDI...ol.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3lzma.exe
windows7-x64
1lzma.exe
windows10-2004-x64
1Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
3f50e640e44b44ce2e0044230131f5ed_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3f50e640e44b44ce2e0044230131f5ed_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/DcryptDll.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/DcryptDll.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
Uninstall.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
Uninstall.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
lzma.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
lzma.exe
Resource
win10v2004-20240709-en
General
-
Target
Uninstall.exe
-
Size
51KB
-
MD5
006d6d8b606e66a547866fa7e67fc809
-
SHA1
14c1616880cdc4298aa093cf8dcec8b25a8442f2
-
SHA256
0b27dc552c06608edd450c89865f1728fa0d37daec77c6b56094de1de96452dd
-
SHA512
57f85b1ca1a2f3f91ba4b68a1f383367436b9f30698ef56dbd8c16718bac328075e1d3bcee064716b9c2b8bf72b8ffc67ac7559cf77a2d1a7f223e97e62b30ff
-
SSDEEP
768:P4wO7XBz+5Qm3W0tYdrQZHV4EWuWEUOg4jjfS3XJ+lwlKhqc5rQ9NCC1Vhb0uip7:wLXB65939tY6HBg4sXJJlQGl1VhbGEd2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1748 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 1748 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral18/files/0x00070000000234cb-3.dat nsis_installer_1 behavioral18/files/0x00070000000234cb-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 848 wrote to memory of 1748 848 Uninstall.exe 85 PID 848 wrote to memory of 1748 848 Uninstall.exe 85 PID 848 wrote to memory of 1748 848 Uninstall.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD57f56c0d6a8733dec142814ed5a58b0ee
SHA1c119e66f179cfb758966f3cf878466057bea1840
SHA25686445396775370aff5834f10bda25e505b6f89efc69a04fe1ce46f5d128be73f
SHA5128b3b9bed985b3583b7be8b2197bb068e5d5508f8b5c4a7fc1278b2662dc8d9a53fd6df63f636e44bfc5aa37f030ac76b8d259d6b446bf87d5c72b74ff5b158f3
-
Filesize
51KB
MD5006d6d8b606e66a547866fa7e67fc809
SHA114c1616880cdc4298aa093cf8dcec8b25a8442f2
SHA2560b27dc552c06608edd450c89865f1728fa0d37daec77c6b56094de1de96452dd
SHA51257f85b1ca1a2f3f91ba4b68a1f383367436b9f30698ef56dbd8c16718bac328075e1d3bcee064716b9c2b8bf72b8ffc67ac7559cf77a2d1a7f223e97e62b30ff