Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
375ae56b379...18.exe
windows7-x64
775ae56b379...18.exe
windows10-2004-x64
7"ElfBowlin...le.exe
windows7-x64
3"ElfBowlin...le.exe
windows10-2004-x64
3"aminstall.dll
windows7-x64
3"aminstall.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3Analysis
-
max time kernel
101s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
75ae56b379d6244f8b52d1fabc8ec2e8_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
75ae56b379d6244f8b52d1fabc8ec2e8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
"ElfBowling_bocce_style.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
"ElfBowling_bocce_style.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
"aminstall.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
"aminstall.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
Uninstall.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
Uninstall.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
General
-
Target
Uninstall.exe
-
Size
66KB
-
MD5
9f6929b916db53a60f8abe4e4aa3616d
-
SHA1
6769fd166236150dc42f963c59836ba157c3c267
-
SHA256
50df1a1be3b535ab32f21542dba5dabd753347a742687fc7aaad9819b22fc8a3
-
SHA512
d778c073418879459f8b0ee69b131aaa5a43d1a05e73740ed3113d42d89d87ba908e1ebbbd030e7fe1d14c9a1a7f17d61f97e75ac536fef05f8b7a2a50cb68e8
-
SSDEEP
1536:9e0DnjRrJav2FnUIRr2vMYBJ5qAELVigm9YixHMbl0+v/5Qmdm:fD11a8YBJoAI0mpwOm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2404 A~NSISu_.exe -
Loads dropped DLL 5 IoCs
pid Process 760 Uninstall.exe 2404 A~NSISu_.exe 2404 A~NSISu_.exe 2404 A~NSISu_.exe 2404 A~NSISu_.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A~NSISu_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral13/files/0x005300000000f5ab-2.dat nsis_installer_1 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2404 A~NSISu_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 760 wrote to memory of 2404 760 Uninstall.exe 29 PID 760 wrote to memory of 2404 760 Uninstall.exe 29 PID 760 wrote to memory of 2404 760 Uninstall.exe 29 PID 760 wrote to memory of 2404 760 Uninstall.exe 29 PID 760 wrote to memory of 2404 760 Uninstall.exe 29 PID 760 wrote to memory of 2404 760 Uninstall.exe 29 PID 760 wrote to memory of 2404 760 Uninstall.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe"C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
637B
MD5201943b2fd2d49d3f1cc8a56dd50072c
SHA1ab28c3a459c7331364edccb01f25e47333b68718
SHA25610b1256dc6db47008816c71c6de1438a6864a363d40ce01f0c1a47deeb24a22a
SHA5125670227c11ebc4d416a760d7d0d0416a266cc0949f7cf74dee1d293515563596aeb97febcaa41152fbe5f8fee33d3f79a81278506f36cabe48558a521be600d5
-
Filesize
66KB
MD59f6929b916db53a60f8abe4e4aa3616d
SHA16769fd166236150dc42f963c59836ba157c3c267
SHA25650df1a1be3b535ab32f21542dba5dabd753347a742687fc7aaad9819b22fc8a3
SHA512d778c073418879459f8b0ee69b131aaa5a43d1a05e73740ed3113d42d89d87ba908e1ebbbd030e7fe1d14c9a1a7f17d61f97e75ac536fef05f8b7a2a50cb68e8
-
Filesize
12KB
MD54c7d97d0786ff08b20d0e8315b5fc3cb
SHA1bb6f475e867b2bf55e4cd214bd4ef68e26d70f6c
SHA25675e20f4c5eb00e9e5cb610273023e9d2c36392fa3b664c264b736c7cc2d1ac84
SHA512f37093fd5cdda74d8f7376c60a05b442f884e9d370347c7c39d84eca88f23fbea6221da2e57197acd78c817a74703c49fb28b89d41c3e34817cc9301b0b6485a