Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
34948c3a0ed...18.exe
windows7-x64
74948c3a0ed...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...le.rtf
windows7-x64
4$PLUGINSDI...le.rtf
windows10-2004-x64
1$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDIR/xml.dll
windows7-x64
3$PLUGINSDIR/xml.dll
windows10-2004-x64
3uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7update_checker.exe
windows7-x64
1update_checker.exe
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 09:54
Static task
static1
Behavioral task
behavioral1
Sample
4948c3a0ed1ec84014230d36f8399d53_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4948c3a0ed1ec84014230d36f8399d53_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/filebulldog-visible.rtf
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/filebulldog-visible.rtf
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/xml.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/xml.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
uninstall.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
uninstall.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
update_checker.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
update_checker.exe
Resource
win10v2004-20240709-en
General
-
Target
uninstall.exe
-
Size
53KB
-
MD5
8c8bf9f4ec4ef0b6303db06ffecb1d0f
-
SHA1
028613f1b3af1f98514f51da73756c60961dab9d
-
SHA256
5652cdd89ad852f9b0fc44c09c6d190f63ee1034891564522ebd6eb79d0c7dec
-
SHA512
cb5bd9633d1eb4a07ffe16d8a26fcbc6bc57fd2120265372faf9fbbb9a9ba909c2a6c896f0e917e04614acf756a6c433731329fbc68972fd93560f4fdec2a5be
-
SSDEEP
768:b1cVhpQI2EQK0iPDh84nScF15GYbWjXO3XJ0LWx2mUeOMgE9LQQ34p:5QpQ5EP0ijnRTXJ0LmUewExQQ34p
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2544 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 2212 uninstall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral15/files/0x00050000000186ff-2.dat nsis_installer_1 behavioral15/files/0x00050000000186ff-2.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2544 2212 uninstall.exe 30 PID 2212 wrote to memory of 2544 2212 uninstall.exe 30 PID 2212 wrote to memory of 2544 2212 uninstall.exe 30 PID 2212 wrote to memory of 2544 2212 uninstall.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD58c8bf9f4ec4ef0b6303db06ffecb1d0f
SHA1028613f1b3af1f98514f51da73756c60961dab9d
SHA2565652cdd89ad852f9b0fc44c09c6d190f63ee1034891564522ebd6eb79d0c7dec
SHA512cb5bd9633d1eb4a07ffe16d8a26fcbc6bc57fd2120265372faf9fbbb9a9ba909c2a6c896f0e917e04614acf756a6c433731329fbc68972fd93560f4fdec2a5be