Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
361901604eb...18.exe
windows7-x64
761901604eb...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$TEMPLATES/Setup.exe
windows7-x64
7$TEMPLATES/Setup.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3KKjie.exe
windows7-x64
7KKjie.exe
windows10-2004-x64
7$EXEDIR/KK...fe.exe
windows7-x64
1$EXEDIR/KK...fe.exe
windows10-2004-x64
1$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3KKjie_safe.exe
windows7-x64
1KKjie_safe.exe
windows10-2004-x64
1KKjie_safe.dll
windows7-x64
1KKjie_safe.dll
windows10-2004-x64
1languages/Chinese.dll
windows7-x64
1languages/Chinese.dll
windows10-2004-x64
1xiezai.exe
windows7-x64
7xiezai.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$TEMPLATES...at.exe
windows7-x64
1$TEMPLATES...at.exe
windows10-2004-x64
1$TEMPLATES...t3.exe
windows7-x64
7$TEMPLATES...t3.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
61901604ebf438822f721a051bdf4f53_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
61901604ebf438822f721a051bdf4f53_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$TEMPLATES/Setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$TEMPLATES/Setup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
KKjie.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
KKjie.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$EXEDIR/KKjie_safe.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$EXEDIR/KKjie_safe.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
KKjie_safe.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
KKjie_safe.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
KKjie_safe.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
KKjie_safe.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
languages/Chinese.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
languages/Chinese.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
xiezai.exe
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
xiezai.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
$TEMPLATES/installstat.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
$TEMPLATES/installstat.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
$TEMPLATES/redalert3.exe
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
$TEMPLATES/redalert3.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
General
-
Target
xiezai.exe
-
Size
40KB
-
MD5
1896b0d7caae95ccffc41e8fab6ae088
-
SHA1
44850e98a146be40086eed7aa71b352b2f67354d
-
SHA256
8f797add4e857820016f6fff5b8d99d6b95a48ce6225a963a7dcbaa5fd3bf0e4
-
SHA512
c543cfe89a02379758d524fa24b846b55435414484c037a3291dc8850ef88881eae59569ed94b40df838bb5adb7676cc46b39a71e455e2f5a1d35bc5fa8e3de2
-
SSDEEP
768:3PH4rKS4GDkQBZ3ImWlTtEIRlJ+qFZ2bSgJzANqM3wJJNnRvOX+C/////2XRL:3f4exGDkeZ4mOoSgJEAJJhod/////2Xh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2764 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2764 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 2764 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral24/files/0x0007000000023535-3.dat nsis_installer_1 behavioral24/files/0x0007000000023535-3.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2764 Au_.exe 2764 Au_.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4248 wrote to memory of 2764 4248 xiezai.exe 84 PID 4248 wrote to memory of 2764 4248 xiezai.exe 84 PID 4248 wrote to memory of 2764 4248 xiezai.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\xiezai.exe"C:\Users\Admin\AppData\Local\Temp\xiezai.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58614c450637267afacad1645e23ba24a
SHA1e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2
SHA2560fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758
SHA512af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b
-
Filesize
40KB
MD51896b0d7caae95ccffc41e8fab6ae088
SHA144850e98a146be40086eed7aa71b352b2f67354d
SHA2568f797add4e857820016f6fff5b8d99d6b95a48ce6225a963a7dcbaa5fd3bf0e4
SHA512c543cfe89a02379758d524fa24b846b55435414484c037a3291dc8850ef88881eae59569ed94b40df838bb5adb7676cc46b39a71e455e2f5a1d35bc5fa8e3de2