Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
748b87f5a44...18.exe
windows7-x64
748b87f5a44...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...le.exe
windows7-x64
7$PLUGINSDI...le.exe
windows10-2004-x64
7$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3MainInstal...ed.exe
windows7-x64
7MainInstal...ed.exe
windows10-2004-x64
7$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3SetupAuto.exe
windows7-x64
7SetupAuto.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...oc.dll
windows7-x64
7$PLUGINSDI...oc.dll
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
32YourFace_Util.dll
windows7-x64
32YourFace_Util.dll
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 07:02
Behavioral task
behavioral1
Sample
48b87f5a44b720f542b53bd66025e466_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
48b87f5a44b720f542b53bd66025e466_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/bundle.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/bundle.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
MainInstallerAutoEmbedded.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
MainInstallerAutoEmbedded.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
SetupAuto.exe
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
SetupAuto.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/KillProc.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/KillProc.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
2YourFace_Util.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
2YourFace_Util.dll
Resource
win10v2004-20240709-en
General
-
Target
MainInstallerAutoEmbedded.exe
-
Size
796KB
-
MD5
7fc6bc14a74dc69773587af10132d8c9
-
SHA1
9d98b268eaa7f4ad208bde39944fdb1ab201e076
-
SHA256
e288d49f6011dcd3f893e54ceafda9b6b491543966521c483064a7df43e5bdd2
-
SHA512
a738205fb26bf259e70b1cacfd10f9168d381778ef90a49847b8d332d93b471cbdcf6357a3d2dfb2e41a4666cba98dd9dc2867a20d472636e5fc8080cc073742
-
SSDEEP
24576:P7yrmq17YLUAl1+O50aT+1bXkS/EZQM7G7ZQ51bmtfWR163i95cVmB:jgbyLV1ILT/ES46S5Bmted6VmB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2240 SetupAuto.exe -
Loads dropped DLL 3 IoCs
pid Process 1208 MainInstallerAutoEmbedded.exe 1208 MainInstallerAutoEmbedded.exe 2240 SetupAuto.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral15/files/0x0008000000012118-7.dat nsis_installer_1 behavioral15/files/0x0008000000012118-7.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2240 SetupAuto.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1208 wrote to memory of 2240 1208 MainInstallerAutoEmbedded.exe 31 PID 1208 wrote to memory of 2240 1208 MainInstallerAutoEmbedded.exe 31 PID 1208 wrote to memory of 2240 1208 MainInstallerAutoEmbedded.exe 31 PID 1208 wrote to memory of 2240 1208 MainInstallerAutoEmbedded.exe 31 PID 1208 wrote to memory of 2240 1208 MainInstallerAutoEmbedded.exe 31 PID 1208 wrote to memory of 2240 1208 MainInstallerAutoEmbedded.exe 31 PID 1208 wrote to memory of 2240 1208 MainInstallerAutoEmbedded.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\MainInstallerAutoEmbedded.exe"C:\Users\Admin\AppData\Local\Temp\MainInstallerAutoEmbedded.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\SetupAuto.exeC:\Users\Admin\AppData\Local\Temp\SetupAuto.exe /PID=0 /NOTIFY=0 /FFR=1 /FFP=02⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
694B
MD59480b2c7411311f08025d1cc071420ca
SHA18c5846bd73b38c6403cd88de1712d7c92f751f53
SHA256f520bf0d26c95c9e508540f5d1936cc6d959f1c442502cc3ded3e0ae6e02bf36
SHA512a6f4762de34d186c6e80b22c0b9d287fa2252e89d3179fd2ad9588ba45850756291d70634d1819bf3c3e8cd2666b5b39920fc45d9c35aefa5befb5c6add6552d
-
Filesize
512KB
MD5ff0198fd1f59b71c1deec34b6b0b0c07
SHA1cae622ad91a3bab0996589e3bf905c9d4eeb6059
SHA256f552d818f17841efb7f06803ecd2479fe5c9b2a0d3c4dad2c9d90b42e2e9d7d5
SHA51296795276eefcde81b0ad4ac85f4aaec368cb93bd9e9912c343316912f1502f3a22d845af3ba75ea5aa92b1936028558d48c11a77d331d49bd77f58b886868ccc
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf