Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
361901604eb...18.exe
windows7-x64
761901604eb...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$TEMPLATES/Setup.exe
windows7-x64
7$TEMPLATES/Setup.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3KKjie.exe
windows7-x64
7KKjie.exe
windows10-2004-x64
7$EXEDIR/KK...fe.exe
windows7-x64
1$EXEDIR/KK...fe.exe
windows10-2004-x64
1$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3KKjie_safe.exe
windows7-x64
1KKjie_safe.exe
windows10-2004-x64
1KKjie_safe.dll
windows7-x64
1KKjie_safe.dll
windows10-2004-x64
1languages/Chinese.dll
windows7-x64
1languages/Chinese.dll
windows10-2004-x64
1xiezai.exe
windows7-x64
7xiezai.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$TEMPLATES...at.exe
windows7-x64
1$TEMPLATES...at.exe
windows10-2004-x64
1$TEMPLATES...t3.exe
windows7-x64
7$TEMPLATES...t3.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
131s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
61901604ebf438822f721a051bdf4f53_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
61901604ebf438822f721a051bdf4f53_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$TEMPLATES/Setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$TEMPLATES/Setup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
KKjie.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
KKjie.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$EXEDIR/KKjie_safe.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$EXEDIR/KKjie_safe.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
KKjie_safe.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
KKjie_safe.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
KKjie_safe.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
KKjie_safe.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
languages/Chinese.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
languages/Chinese.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
xiezai.exe
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
xiezai.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
$TEMPLATES/installstat.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
$TEMPLATES/installstat.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
$TEMPLATES/redalert3.exe
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
$TEMPLATES/redalert3.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
General
-
Target
$TEMPLATES/redalert3.exe
-
Size
49KB
-
MD5
9a0d407e720246d6a48ef7cc369c49ef
-
SHA1
cd7e422b3130298e2075838a7ccdd6eaedd2ca1f
-
SHA256
5cd375441e87c3e728694fa7d956fedde62e5bc537e4c615a60107902f5fe58e
-
SHA512
b70d8068a69b54dfe598852178d3c88b71a5d445108d5aab0a1f068dda58b71906740a838a1497fae543c8bf276812164f50b0103a5828b9cc278c9d6e94d215
-
SSDEEP
768:2hMZ0dF4ZFvQbn+eePu3cIQGCGbiC4k42M3wJJEX7NQz2r0/djiJXj+Jp:2yZMSZFvknTePMZd4k4kJJELR6dkG
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 804 redalert3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main regedit.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.i4455.com/?005" regedit.exe -
Modifies registry class 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID redalert3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D} redalert3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} redalert3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage redalert3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}\InprocServer32 redalert3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}\InprocServer32\ = "G:\\\\Program Files\\\\360safe\\\\safemon\\\\safemon.dll" redalert3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{98B7C13A-E9CD-4959-8B46-FBEAB41E42A8}\InprocServer32\ = "G:\\\\WINDOWS\\\\system32\\\\urlFilter.dll" redalert3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command redalert3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node redalert3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell redalert3.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command redalert3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{98B7C13A-E9CD-4959-8B46-FBEAB41E42A8} redalert3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{98B7C13A-E9CD-4959-8B46-FBEAB41E42A8}\InprocServer32 redalert3.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1448 regedit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 804 redalert3.exe Token: SeBackupPrivilege 804 redalert3.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 804 wrote to memory of 1448 804 redalert3.exe 30 PID 804 wrote to memory of 1448 804 redalert3.exe 30 PID 804 wrote to memory of 1448 804 redalert3.exe 30 PID 804 wrote to memory of 1448 804 redalert3.exe 30 PID 804 wrote to memory of 1448 804 redalert3.exe 30 PID 804 wrote to memory of 1448 804 redalert3.exe 30 PID 804 wrote to memory of 1448 804 redalert3.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMPLATES\redalert3.exe"C:\Users\Admin\AppData\Local\Temp\$TEMPLATES\redalert3.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\kjfs.reg"2⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Runs .reg file with regedit
PID:1448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292B
MD5cfb618699ec57373511da638964db3e1
SHA1db21b9920309072ab99fd6ae186d807c5033f224
SHA2565fe9110e3d21d291d9d55d4830ed71597b60b671987067435b97888c7074bbde
SHA51276f445ffea81e71c28c3785e91f74213950ed73eaeece926e194005dbbe3d92368d3cd6323a496528f2bcd3da851259e93fabbc22db7cbbe23c911c9c1e0ac75
-
Filesize
10KB
MD52b54369538b0fb45e1bb9f49f71ce2db
SHA1c20df42fda5854329e23826ba8f2015f506f7b92
SHA256761dcdf12f41d119f49dbdca9bcab3928bbdfd8edd67e314d54689811f9d3e2f
SHA51225e4898e3c082632dfd493756c4cc017decbef43ffa0b68f36d037841a33f2a1721f30314a85597ac30c7ecc99b7257ea43f3a903744179578a9c65fcf57a8b7