Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
33d9fabd4c0...18.exe
windows7-x64
13d9fabd4c0...18.exe
windows10-2004-x64
1$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ol.dll
windows7-x64
3$PLUGINSDI...ol.dll
windows10-2004-x64
3Basement.dll
windows7-x64
1Basement.dll
windows10-2004-x64
1ImEngine.dll
windows7-x64
1ImEngine.dll
windows10-2004-x64
1MediaEngine.dll
windows7-x64
1MediaEngine.dll
windows10-2004-x64
1PEngine.dll
windows7-x64
1PEngine.dll
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 13:46
Static task
static1
Behavioral task
behavioral1
Sample
3d9fabd4c0a43457ab08a5fa4b306d91_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3d9fabd4c0a43457ab08a5fa4b306d91_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UACTool.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UACTool.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Basement.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Basement.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
ImEngine.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
ImEngine.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
MediaEngine.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
MediaEngine.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
PEngine.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
PEngine.dll
Resource
win10v2004-20240709-en
General
-
Target
$PLUGINSDIR/UACTool.dll
-
Size
52KB
-
MD5
a48f07da3ebf593950064cf3b2ad0922
-
SHA1
ac7eff340d33857fc8f510e820678298a47ea72f
-
SHA256
94726afb55e1036051210fa14f9c286ca0287af423f25f45efca856c09d97da6
-
SHA512
ddf9b9dd860bf3d29c2150fb749aaf45ea77dfd8f27d832245ec8089235dc64e9dd77b49a4a8155d7e580790239f68c4d74815648658deb219c2462a5cfc298f
-
SSDEEP
768:r3ygAY7Ipn6prdhfGj90//ypWz6pI+peftOPAy+R:OBXpn6bh0y//jz6p9Mtly+
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1488 1068 WerFault.exe 30 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1068 1724 rundll32.exe 30 PID 1724 wrote to memory of 1068 1724 rundll32.exe 30 PID 1724 wrote to memory of 1068 1724 rundll32.exe 30 PID 1724 wrote to memory of 1068 1724 rundll32.exe 30 PID 1724 wrote to memory of 1068 1724 rundll32.exe 30 PID 1724 wrote to memory of 1068 1724 rundll32.exe 30 PID 1724 wrote to memory of 1068 1724 rundll32.exe 30 PID 1068 wrote to memory of 1488 1068 rundll32.exe 31 PID 1068 wrote to memory of 1488 1068 rundll32.exe 31 PID 1068 wrote to memory of 1488 1068 rundll32.exe 31 PID 1068 wrote to memory of 1488 1068 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\UACTool.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\UACTool.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 2243⤵
- Program crash
PID:1488
-
-