Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3b3c2ab438c...18.exe
windows7-x64
7b3c2ab438c...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...er.exe
windows7-x64
3$PLUGINSDI...er.exe
windows10-2004-x64
3$PLUGINSDI...ar.exe
windows7-x64
3$PLUGINSDI...ar.exe
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ne.exe
windows7-x64
7$PLUGINSDI...ne.exe
windows10-2004-x64
7AdminWorker.exe
windows7-x64
3AdminWorker.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3WebInstaller.exe
windows7-x64
6WebInstaller.exe
windows10-2004-x64
6WebUpdater.exe
windows7-x64
3WebUpdater.exe
windows10-2004-x64
3content/iwa-ovr.js
windows7-x64
3content/iwa-ovr.js
windows10-2004-x64
3content/iwinarcade.js
windows7-x64
3content/iwinarcade.js
windows10-2004-x64
3content/un...l.html
windows7-x64
3content/un...l.html
windows10-2004-x64
3Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
b3c2ab438cc2efd085914345badac554_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b3c2ab438cc2efd085914345badac554_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/GameuxInstallHelper.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/GameuxInstallHelper.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstGameInfoHelper.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstGameInfoHelper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/IwinToolbar.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/IwinToolbar.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/smartinstallAllinOne.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/smartinstallAllinOne.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
AdminWorker.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
AdminWorker.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/GameuxInstallHelper.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/GameuxInstallHelper.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
WebInstaller.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
WebInstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
WebUpdater.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
WebUpdater.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
content/iwa-ovr.js
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
content/iwa-ovr.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
content/iwinarcade.js
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
content/iwinarcade.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
content/uninstall.html
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
content/uninstall.html
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/smartinstallAllinOne.exe
-
Size
202KB
-
MD5
082c78654828352b43e7818ae272c826
-
SHA1
b1a6c498bc0ed6776e84345e30df83a7c0db425a
-
SHA256
981c92d332c0c69c89b2c8d944f8a773823ec91228deb4447898773df7822bc5
-
SHA512
eb6ef52b589d0b948992c23781516745d6417a96bfc85fab2654b3dca18d6a61e4083c04afd8bb887ce0f721f197cd1fc1738af7a65dd1ad77ddd86597f73ac1
-
SSDEEP
6144:h40JDvFeKBw8v92A7BBNC0kz/ifYxUxBE1T3N:71Bv/NwbWTC3N
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2304 GLB33BD.tmp -
Loads dropped DLL 2 IoCs
pid Process 3048 smartinstallAllinOne.exe 2304 GLB33BD.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLB33BD.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smartinstallAllinOne.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2304 3048 smartinstallAllinOne.exe 29 PID 3048 wrote to memory of 2304 3048 smartinstallAllinOne.exe 29 PID 3048 wrote to memory of 2304 3048 smartinstallAllinOne.exe 29 PID 3048 wrote to memory of 2304 3048 smartinstallAllinOne.exe 29 PID 3048 wrote to memory of 2304 3048 smartinstallAllinOne.exe 29 PID 3048 wrote to memory of 2304 3048 smartinstallAllinOne.exe 29 PID 3048 wrote to memory of 2304 3048 smartinstallAllinOne.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\smartinstallAllinOne.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\smartinstallAllinOne.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\GLB33BD.tmpC:\Users\Admin\AppData\Local\Temp\GLB33BD.tmp 4736 C:\Users\Admin\AppData\Local\Temp\$PLUGI~1\SMARTI~1.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD591c551a92e678f977821ea9c1079f984
SHA1f3243b6ff7ea118a178f301a9bd3d0dc1a18741d
SHA2569bb92f379e5c313528112a53488ca106f1da97c88082f124fcdfbdb392833db6
SHA512f584b1094ab4ce1db7976706aca2c89601c80a106d86eeaf2b2b4a4059ff54e0c94817bd5ddd3bb21a6584878efad8262b9a1d7961a80035785240995854e491
-
Filesize
161KB
MD58c97d8bb1470c6498e47b12c5a03ce39
SHA115d233b22f1c3d756dca29bcc0021e6fb0b8cdf7
SHA256a87f19f9fee475d2b2e82acfb4589be6d816b613064cd06826e1d4c147beb50a
SHA5127ad0b2b0319da52152c2595ee45045d0c06b157cdaaa56ad57dde9736be3e45fd7357949126f80d3e72b21510f9bf69d010d51b3967a7644662808beed067c3f