Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3a31156b8d8...18.exe
windows7-x64
7a31156b8d8...18.exe
windows10-2004-x64
7$PLUGINSDI...ol.dll
windows7-x64
3$PLUGINSDI...ol.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3LinkCreator.exe
windows7-x64
3LinkCreator.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3eMule Light.js
windows7-x64
3eMule Light.js
windows10-2004-x64
3eMule.js
windows7-x64
3eMule.js
windows10-2004-x64
3emule.exe
windows7-x64
3emule.exe
windows10-2004-x64
3lang/ar_AE.dll
windows7-x64
1lang/ar_AE.dll
windows10-2004-x64
1lang/ba_BA.dll
windows7-x64
1lang/ba_BA.dll
windows10-2004-x64
1lang/bg_BG.dll
windows7-x64
1lang/bg_BG.dll
windows10-2004-x64
1lang/ca_ES.dll
windows7-x64
1lang/ca_ES.dll
windows10-2004-x64
1lang/cz_CZ.dll
windows7-x64
1lang/cz_CZ.dll
windows10-2004-x64
1Analysis
-
max time kernel
131s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 15:21
Static task
static1
Behavioral task
behavioral1
Sample
a31156b8d80a68e8f4354c63e0747beb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a31156b8d80a68e8f4354c63e0747beb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
LinkCreator.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
LinkCreator.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
eMule Light.js
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
eMule Light.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
eMule.js
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
eMule.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
emule.exe
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
emule.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
lang/ar_AE.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
lang/ar_AE.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
lang/ba_BA.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
lang/ba_BA.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
lang/bg_BG.dll
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
lang/bg_BG.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
lang/ca_ES.dll
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
lang/ca_ES.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
lang/cz_CZ.dll
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
lang/cz_CZ.dll
Resource
win10v2004-20240802-en
General
-
Target
emule.exe
-
Size
5.5MB
-
MD5
f3f709c2d49dd6636f4ede5c2cae5448
-
SHA1
8e0ea03e4c38199e10a2bc12db8b2df70484111d
-
SHA256
06cdf814387f627a4bd05a0c68211f715bfa952423e8e8a462e1f47c11a4d20e
-
SHA512
7a0df912b5ddc149d770260a2e1a3f55e58ac2e9ef02883e8baa08e79261075b82955bc8e57641bb2c16983abcada2581850fafc11b92a133605127bda80513e
-
SSDEEP
49152:/BGoXbyOj8LePLHcPPLRCAnyOTxP9DzE4GEATLHYiipKXePi9Wxmw7b4ZC1VTWS3:rEWLHcPFCv745ATLHY1kO6g0w7b0XiG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emule.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\ed2k\shell\open\command emule.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\ed2k\shell emule.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\ed2k\shell\open emule.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\ed2k\ = "URL: ed2k Protocol" emule.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\ed2k emule.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\ed2k\DefaultIcon emule.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\ed2k\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\emule.exe\" \"%1\"" emule.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\ed2k\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\emule.exe" emule.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\ed2k\URL Protocol emule.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2304 emule.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2304 emule.exe 2304 emule.exe 2304 emule.exe 2304 emule.exe 2304 emule.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2304 emule.exe 2304 emule.exe 2304 emule.exe 2304 emule.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2304 emule.exe 2304 emule.exe 2304 emule.exe 2304 emule.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\emule.exe"C:\Users\Admin\AppData\Local\Temp\emule.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26B
MD5ec0280f3f439c6febb6b49883c5c100e
SHA1642fe5a3945184440c48368e92c0d6be4c195326
SHA256f124bff0c7833f05418d9980d994152346329d8ca56d080840859aca3a78f151
SHA512cb5e24ed70c9228eeb0028be1ed1cd69c1bc7961f203290a6fa9b0f55780167ca4d989ce09a2f654504da5bcc9e4ce79ea4f5121680a62fb65bcf929f109f5fc
-
Filesize
1KB
MD521c9c0b98bc3eba4257368410ceed74e
SHA15421a84d9573ca6119d3453297209042d4ed0808
SHA25655a0050ba9a5e0abce09ddb2fe7a33fd29dc151465cd9c529068a3110f851218
SHA51239d2f95896b6ba4ea7fd1a1ab7db617761213ec643c15baf984c1487d6ace1ccac7ff9c2c456b803b1a64dc4fc62cd6d0d420b15507838f71ffaf94004e47645
-
Filesize
1KB
MD531a34832f36ce2b28a2df4d30408248a
SHA114e2b22ee5e14418823b16de7a2a8a8b00026a8b
SHA256c8ac46efd4f1d457831373acae25baa3feb2afdf9e0282c666b72edc5037182f
SHA5123834551e8a989f43d4dcfd40698b7bc452e19ebf4848448acd96ce8a43dfba4e20a8164698e0e17507567e503e5bc89babf921ad0de3980e5590d2958bfccb12