Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 05:52
Static task
static1
Behavioral task
behavioral1
Sample
5ab5d439876f093f5fd7a4f2b015b4be_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5ab5d439876f093f5fd7a4f2b015b4be_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
movieAndTVs.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
movieAndTVs.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
uninst.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
uninst.exe
Resource
win10v2004-20240709-en
General
-
Target
uninst.exe
-
Size
56KB
-
MD5
53ffd81061af4da1ff0dbd2eb92cc84b
-
SHA1
78409e1bea3ec5749ca3e67036459e750fb9fd37
-
SHA256
fdaee457a4043502a3dce6edb60b9e91569d120d68367472139723f8b01c94b0
-
SHA512
fcbd7b4ee9574324bd6919d0fb0d3b8d88cbeb19c6f9ff71e8e23c59192fb3c8d1c2401747787d84deeff6ee3dee2df66a5d7b4d5212cdde822567c4e439b6c8
-
SSDEEP
1536:kYTmwVUsW7dtJMHy0DxmJwgu4D0LbANpHok:HS17XJiDxmJwvbAQk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2128 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2128 Au_.exe -
Loads dropped DLL 4 IoCs
pid Process 1620 uninst.exe 2128 Au_.exe 2128 Au_.exe 2128 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral7/files/0x0006000000018c31-2.dat nsis_installer_1 behavioral7/files/0x0006000000018c31-2.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2128 1620 uninst.exe 30 PID 1620 wrote to memory of 2128 1620 uninst.exe 30 PID 1620 wrote to memory of 2128 1620 uninst.exe 30 PID 1620 wrote to memory of 2128 1620 uninst.exe 30 PID 1620 wrote to memory of 2128 1620 uninst.exe 30 PID 1620 wrote to memory of 2128 1620 uninst.exe 30 PID 1620 wrote to memory of 2128 1620 uninst.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD553ffd81061af4da1ff0dbd2eb92cc84b
SHA178409e1bea3ec5749ca3e67036459e750fb9fd37
SHA256fdaee457a4043502a3dce6edb60b9e91569d120d68367472139723f8b01c94b0
SHA512fcbd7b4ee9574324bd6919d0fb0d3b8d88cbeb19c6f9ff71e8e23c59192fb3c8d1c2401747787d84deeff6ee3dee2df66a5d7b4d5212cdde822567c4e439b6c8