Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
38bd9a3095e...18.exe
windows7-x64
88bd9a3095e...18.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...is.dll
windows7-x64
3$PLUGINSDI...is.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ox.dll
windows7-x64
3$PLUGINSDI...ox.dll
windows10-2004-x64
3$SMSTARTUP...��.exe
windows7-x64
3$SMSTARTUP...��.exe
windows10-2004-x64
37zr.exe
windows7-x64
37zr.exe
windows10-2004-x64
3Encode.exe
windows7-x64
1Encode.exe
windows10-2004-x64
3FZip.dll
windows7-x64
3FZip.dll
windows10-2004-x64
3HTTP.dll
windows7-x64
3HTTP.dll
windows10-2004-x64
3LHInstall.dll
windows7-x64
3LHInstall.dll
windows10-2004-x64
3LangHua.exe
windows7-x64
8LangHua.exe
windows10-2004-x64
8LhLogSvr.dll
windows7-x64
3LhLogSvr.dll
windows10-2004-x64
3LhTips.exe
windows7-x64
3LhTips.exe
windows10-2004-x64
3Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 20:28
Static task
static1
Behavioral task
behavioral1
Sample
8bd9a3095ebb74383c3103bfc41765b0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8bd9a3095ebb74383c3103bfc41765b0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LhNsis.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LhNsis.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/ebanner.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/ebanner.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/messagebox.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/messagebox.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$SMSTARTUP/7k7kϷ.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
$SMSTARTUP/7k7kϷ.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
7zr.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
7zr.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Encode.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
Encode.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
FZip.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
FZip.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
HTTP.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
HTTP.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
LHInstall.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
LHInstall.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
LangHua.exe
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
LangHua.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
LhLogSvr.dll
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
LhLogSvr.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
LhTips.exe
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
LhTips.exe
Resource
win10v2004-20240802-en
General
-
Target
LangHua.exe
-
Size
2.1MB
-
MD5
4d1770fca9559746469e30933b4d83fd
-
SHA1
f0b0a86cb17f06aaa808e073e5e4c25a55057e1b
-
SHA256
d50be917d4aa3352b4adbed554517f1a473bda771c6e70cdc0431ebb08fa3ca5
-
SHA512
f5ec293042bbd838f283f89772375c33236cb0777490722fd1eb394d60677523c80eeb9f7ba742c919806d42cbb2922824130e821b65bb203e13e95257d8bf02
-
SSDEEP
49152:/E/tUmAN3BPMm19duFeUFmodToFbzeGVuv7dnMmM15UuLWy/zc:/E/toBPdEToFveGVKdni15UuLvA
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 3220 Netsh.exe 916 Netsh.exe 3580 Netsh.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 LangHua.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LangHua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QKDown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Netsh.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\IESettingSync LangHua.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" LangHua.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch LangHua.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" LangHua.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: 33 2032 LangHua.exe Token: SeIncBasePriorityPrivilege 2032 LangHua.exe Token: 33 2032 LangHua.exe Token: SeIncBasePriorityPrivilege 2032 LangHua.exe Token: 33 2032 LangHua.exe Token: SeIncBasePriorityPrivilege 2032 LangHua.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2032 LangHua.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2032 LangHua.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2032 LangHua.exe 2032 LangHua.exe 2032 LangHua.exe 2032 LangHua.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1036 2032 LangHua.exe 91 PID 2032 wrote to memory of 1036 2032 LangHua.exe 91 PID 2032 wrote to memory of 1036 2032 LangHua.exe 91 PID 1036 wrote to memory of 3580 1036 QKDown.exe 92 PID 1036 wrote to memory of 3580 1036 QKDown.exe 92 PID 1036 wrote to memory of 3580 1036 QKDown.exe 92 PID 1036 wrote to memory of 916 1036 QKDown.exe 93 PID 1036 wrote to memory of 916 1036 QKDown.exe 93 PID 1036 wrote to memory of 916 1036 QKDown.exe 93 PID 1036 wrote to memory of 3220 1036 QKDown.exe 94 PID 1036 wrote to memory of 3220 1036 QKDown.exe 94 PID 1036 wrote to memory of 3220 1036 QKDown.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\LangHua.exe"C:\Users\Admin\AppData\Local\Temp\LangHua.exe"1⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\QKDown.exe"C:\Users\Admin\AppData\Local\Temp\QKDown.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\Netsh.exeNetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\QKDown.exe" PPVOD ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3580
-
-
C:\Windows\SysWOW64\Netsh.exeNetsh firewall add portopening TCP 14419 KwMusic3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:916
-
-
C:\Windows\SysWOW64\Netsh.exeNetsh firewall add portopening UDP 14419 KwMusic3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3220
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
853B
MD5364e327586e2420be0a4035083429f9c
SHA16db3656e512f071a08a97f0fb0ea2b531cceb8b4
SHA25675b5854638b58a1b1f909499b6362b5c5a8610eeca83a39659864d2db8525a32
SHA512ff675f0c683d598944fe3c459b497ea7e76970cfa65f852c63e49e974d6bfe55ea867da5de558f7a2dcf37881154a7e9d03a0087b21b224f69ed87e60b2e5d1d
-
Filesize
1KB
MD5ceea80c0a46c69442f444180f63a4224
SHA1f05994e199abe27e52fa49505f921afb2951d14c
SHA2568b4e09cdbcd73736c1ded15d8809f09a0eacd9695a65ea5d483981cc3c05ddd1
SHA512893334dfbde58260dc430841d2fcb8435fc41bbf5ab646ef47bcec71210a0cda38b65ca81a02e2500aa46412cdf9f6dde2fdc801cd354f2beb828b667462902f
-
Filesize
1KB
MD50557ab52a50ed93293a8859b4212ec73
SHA1ee7ec32cbf9a699a6460253bc8d1bcc906ac4439
SHA256fa5bb7b3a9599dd614268039d2d6636da2f60dd9f92f7c67ccf14d4e3fad25fe
SHA512be5336155a38632d1428305a675ab3d75f8b22e2ee23d8f77c765792d2792a33bbefa1054015696ef0a580863c86c25ceae1e3a2bba0ffe6e81f6aabee67b312