Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
34948c3a0ed...18.exe
windows7-x64
74948c3a0ed...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...le.rtf
windows7-x64
4$PLUGINSDI...le.rtf
windows10-2004-x64
1$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDIR/xml.dll
windows7-x64
3$PLUGINSDIR/xml.dll
windows10-2004-x64
3uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7update_checker.exe
windows7-x64
1update_checker.exe
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 09:54
Static task
static1
Behavioral task
behavioral1
Sample
4948c3a0ed1ec84014230d36f8399d53_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4948c3a0ed1ec84014230d36f8399d53_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/filebulldog-visible.rtf
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/filebulldog-visible.rtf
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/xml.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/xml.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
uninstall.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
uninstall.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
update_checker.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
update_checker.exe
Resource
win10v2004-20240709-en
General
-
Target
update_checker.exe
-
Size
190KB
-
MD5
fd9b065e442d3c9a81188c8fc5dbfc96
-
SHA1
7ef66c2fb137008fed913aff96c8d331b239ac22
-
SHA256
f854d61b9b0be2610bd8cb766b7206e07b25fe85715bda060d88ecff80dfc340
-
SHA512
6bb900abdb254f141624de3d79ea01830192ebaa5c4ba800cb48c85fc578f3ea5d6bb4c51363bba25270a10a645ba0f156bc14d966b31fae30f6fdd7cec8d744
-
SSDEEP
3072:60Ta3qy6st1ZQMO+0YOTaWKDjuipiMfCg86Js88XOSZDDiI5P4qVvQOhHFWUYCIz:Pa3qy6stjQOMLKDjumnJsX5S64qVoORa
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Software\Microsoft\Internet Explorer\ProtocolExecute\sdp update_checker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\sdp\WarnOnOpen = "0" update_checker.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sdp update_checker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sdp\ = "URL:SDP Protocol" update_checker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sdp\URL Protocol update_checker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sdp\shell\open\command update_checker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sdp\shell update_checker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sdp\shell\open update_checker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sdp\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\update_checker.exe\" /protocol %1" update_checker.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 740 update_checker.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 740 update_checker.exe