Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3a067bacad5...18.exe
windows7-x64
7a067bacad5...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$TEMP/licdata.rtf
windows7-x64
4$TEMP/licdata.rtf
windows10-2004-x64
1$TEMP/rkverify.exe
windows7-x64
7$TEMP/rkverify.exe
windows10-2004-x64
7Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
a067bacad57182cbbc45f2fc7263790c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a067bacad57182cbbc45f2fc7263790c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$TEMP/licdata.rtf
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$TEMP/licdata.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$TEMP/rkverify.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$TEMP/rkverify.exe
Resource
win10v2004-20240802-en
General
-
Target
$TEMP/rkverify.exe
-
Size
368KB
-
MD5
7ce09413d7e39a8d984d29b032499a68
-
SHA1
23b404b6d460c57572e277883527a7af053dd7d2
-
SHA256
7d9967027f313bdc045565d408fd278600d2f59557ef943b1dedd65a2bc2c320
-
SHA512
27d75e7b62310c0203b71a57d296798a5201d3b7ead5fa946073a328ace9174f66f540069587ea982d84dd603f5181b98ca6ace1df654c8f6068dc520cc7dab2
-
SSDEEP
6144:80Qrfc/0PXVVw0uHfQEVjwYcvsbkxbUSicNtUmUTBqwNtolgFV4/PxxCNlMW8:80QY8PXTwz7w+kWcNqmUTsw0l6u/P2N2
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2460 rkverify.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rkverify.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2460 rkverify.exe 2460 rkverify.exe 2460 rkverify.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\rkverify.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\rkverify.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5c760be13a9328aaa3e75075b86520546
SHA1e23459a7ce698ef9421147964d33c49323f5bc28
SHA2561f63e66d08225a0f775c13cbb052d7cba0f19fb760767973e8bf7eb4152a18fd
SHA51254ad187e54416a9d8cbf385b4f37723c513a960bb0c73f685c8c454eafc2b0f8e75adb060f65cf4d166236a756ddf735a78a6dba22096a2a59e26e6fe58265b7