Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
38aaf4eba60...18.exe
windows7-x64
78aaf4eba60...18.exe
windows10-2004-x64
7$0.dll
windows7-x64
3$0.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PROGRAMFI...to.chm
windows7-x64
1$PROGRAMFI...to.chm
windows10-2004-x64
1$TEMP/4673...up.dll
windows7-x64
3$TEMP/4673...up.dll
windows10-2004-x64
3$TEMP/4673...le.exe
windows7-x64
1$TEMP/4673...le.exe
windows10-2004-x64
3$TEMP/Move...on.dll
windows7-x64
3$TEMP/Move...on.dll
windows10-2004-x64
3InstDrvAction-32.exe
windows7-x64
3InstDrvAction-32.exe
windows10-2004-x64
3UnloadModule.exe
windows7-x64
1UnloadModule.exe
windows10-2004-x64
3ePassNgMgr.exe
windows7-x64
3ePassNgMgr.exe
windows10-2004-x64
3ft12drv.dll
windows7-x64
4ft12drv.dll
windows10-2004-x64
4uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
8aaf4eba60924032f832fc6223780678_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8aaf4eba60924032f832fc6223780678_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$0.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PROGRAMFILES/ngsrv/lang/howto.chm
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PROGRAMFILES/ngsrv/lang/howto.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$TEMP/4673551D-STFT12-4FE7-A218-48BDAE051E2B_std/NGSetup.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
$TEMP/4673551D-STFT12-4FE7-A218-48BDAE051E2B_std/NGSetup.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$TEMP/4673551D-STFT12-4FE7-A218-48BDAE051E2B_std/UnloadModule.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$TEMP/4673551D-STFT12-4FE7-A218-48BDAE051E2B_std/UnloadModule.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$TEMP/MoveOldVersion.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$TEMP/MoveOldVersion.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
InstDrvAction-32.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
InstDrvAction-32.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
UnloadModule.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
UnloadModule.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
ePassNgMgr.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
ePassNgMgr.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
ft12drv.dll
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
ft12drv.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
uninst.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
uninst.exe
-
Size
149KB
-
MD5
7d0e1740584afdb1e99e6c9c19995598
-
SHA1
a3386ecdc55b829486eb6dffb906a2717137dda1
-
SHA256
40ff460e185c76f5ed7a9110b740aa000092cc5776cc76d823eb443680da0b96
-
SHA512
51c2d281d258424485ce24293d5769828e486c7c566a42fd2934825c1a8035922ac15c7b95bc28ae46b32e362120b2422eaa72d68352108ddf502be046741177
-
SSDEEP
3072:tYg4pumJGq4JXCgFytYp81Vq9/945QW2ZZMHKmk45MBpKPWA:tlg4JXjytk146FQlkoG0PWA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2744 Au_.exe -
Loads dropped DLL 8 IoCs
pid Process 3052 uninst.exe 2744 Au_.exe 2744 Au_.exe 2744 Au_.exe 2744 Au_.exe 2744 Au_.exe 2744 Au_.exe 2744 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral27/files/0x000500000001939d-2.dat nsis_installer_1 behavioral27/files/0x000500000001939d-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2744 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2744 3052 uninst.exe 30 PID 3052 wrote to memory of 2744 3052 uninst.exe 30 PID 3052 wrote to memory of 2744 3052 uninst.exe 30 PID 3052 wrote to memory of 2744 3052 uninst.exe 30 PID 3052 wrote to memory of 2744 3052 uninst.exe 30 PID 3052 wrote to memory of 2744 3052 uninst.exe 30 PID 3052 wrote to memory of 2744 3052 uninst.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
642B
MD52c94e021b7d3f2b87adc44849b9e5f54
SHA1bbff692908f1562806aad6fb8bdbc46f52702526
SHA2567c8d83a30065216b0f7d0a2ea8cd0a3b29a89a869c47f25ff1c7e7c50eb8a4cb
SHA5125b9ede1758df81af8ca9a944b9dc3356fe058981ec6e63e48422869c93bb0f7fbc8694ebf75a203c87160c6fc258d5143baa1b9129e60c5ce1376870d2875ee4
-
Filesize
14KB
MD5eef9e469e8a30717974499f277d97e2a
SHA12d33c25984ebd9116beeb55cdde4c5c86c023e5d
SHA2561f35bb6728237483c779005fc227e69fef51b0bafd32d15855d483948a337078
SHA512d860132106a1c03dfa23f983b3c503f1216ac02f3d47833b96dfb333fb30bc8ab4d4fecd1f1f0a89f0c7f3586405461e2d53c26f282bb48970e549659b364b48
-
Filesize
11KB
MD5c6f5b9596db45ce43f14b64e0fbcf552
SHA1665a2207a643726602dc3e845e39435868dddabc
SHA2564b6da3f2bdb6c452fb493b98f6b7aa1171787dbd3fa2df2b3b22ccaeac88ffa0
SHA5128faa0204f9ed2721acede285be843b5a2d7f9986841bcf3816ebc8900910afb590816c64aebd2dd845686daf825bbf9970cb4a08b20a785c7e54542eddc5b09a
-
Filesize
4KB
MD566bb40a1defb0aef9865919689d4aa96
SHA190cc473004f4351f25d026d13b3f7cb19ee23908
SHA25682772146a77ac3bf5e3564361ca0de0b612a44482de4cf418c3deaa3b2ae7f1a
SHA5121f26650b7d0068b7e8ad1ac861e00bd184c8bf47363e4766b17a9aed5985f8a54efdde87b30cd9b649d6f5b8eb991ef9d06d4501eac264e1ff096506786133c2
-
Filesize
149KB
MD57d0e1740584afdb1e99e6c9c19995598
SHA1a3386ecdc55b829486eb6dffb906a2717137dda1
SHA25640ff460e185c76f5ed7a9110b740aa000092cc5776cc76d823eb443680da0b96
SHA51251c2d281d258424485ce24293d5769828e486c7c566a42fd2934825c1a8035922ac15c7b95bc28ae46b32e362120b2422eaa72d68352108ddf502be046741177