Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3b3c2ab438c...18.exe
windows7-x64
7b3c2ab438c...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...er.exe
windows7-x64
3$PLUGINSDI...er.exe
windows10-2004-x64
3$PLUGINSDI...ar.exe
windows7-x64
3$PLUGINSDI...ar.exe
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ne.exe
windows7-x64
7$PLUGINSDI...ne.exe
windows10-2004-x64
7AdminWorker.exe
windows7-x64
3AdminWorker.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3WebInstaller.exe
windows7-x64
6WebInstaller.exe
windows10-2004-x64
6WebUpdater.exe
windows7-x64
3WebUpdater.exe
windows10-2004-x64
3content/iwa-ovr.js
windows7-x64
3content/iwa-ovr.js
windows10-2004-x64
3content/iwinarcade.js
windows7-x64
3content/iwinarcade.js
windows10-2004-x64
3content/un...l.html
windows7-x64
3content/un...l.html
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
b3c2ab438cc2efd085914345badac554_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b3c2ab438cc2efd085914345badac554_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/GameuxInstallHelper.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/GameuxInstallHelper.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstGameInfoHelper.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstGameInfoHelper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/IwinToolbar.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/IwinToolbar.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/smartinstallAllinOne.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/smartinstallAllinOne.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
AdminWorker.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
AdminWorker.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/GameuxInstallHelper.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/GameuxInstallHelper.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
WebInstaller.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
WebInstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
WebUpdater.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
WebUpdater.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
content/iwa-ovr.js
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
content/iwa-ovr.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
content/iwinarcade.js
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
content/iwinarcade.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
content/uninstall.html
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
content/uninstall.html
Resource
win10v2004-20240802-en
General
-
Target
Uninstall.exe
-
Size
129KB
-
MD5
49c9d6cadd02bfff54851d0b0cafd557
-
SHA1
9bb1dbff1ff7fcf171610133354ffeab1f522d82
-
SHA256
c7550a63d4547fb15d9eb84b10bd7ed68e71e860604da1b7fd3c375ce58f0cbe
-
SHA512
c982f388f605bbdb784b04078a2e2cce7794867b45cc89359425efa7ab3101ba9410b3867554da0f2ebc62895e8ed0ff6211fb1e0408860962907a49942f76eb
-
SSDEEP
3072:w+8uyHOQXJoHS4Z5t2Zip6dmDHgG2ojdotyVnwz:w8+/4fQsp6dAT2ojdoIBwz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2744 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2744 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 3052 Uninstall.exe 2744 Au_.exe 2744 Au_.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\iWinArcadeIECleanup = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iWinArcadeAutocleanup.bat" Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminWorker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iWinGames.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iWinGames.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminWorker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminWorker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iWinTrusted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WebInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminWorker.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral17/files/0x000500000001a51d-2.dat nsis_installer_1 behavioral17/files/0x000500000001a51d-2.dat nsis_installer_2 -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Software\Microsoft\Windows Au_.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Software\Microsoft\Windows\CurrentVersion Au_.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Software\Microsoft\Windows\CurrentVersion\GameUX Au_.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Software\Microsoft\Windows\CurrentVersion\GameUX\GamesToFindOnWindowsUpgrade Au_.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Software Au_.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Software\Microsoft Au_.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1780 AdminWorker.exe 1780 AdminWorker.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2744 Au_.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1780 AdminWorker.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2656 iWinGames.exe 2724 iWinGames.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2744 3052 Uninstall.exe 30 PID 3052 wrote to memory of 2744 3052 Uninstall.exe 30 PID 3052 wrote to memory of 2744 3052 Uninstall.exe 30 PID 3052 wrote to memory of 2744 3052 Uninstall.exe 30 PID 2744 wrote to memory of 2688 2744 Au_.exe 31 PID 2744 wrote to memory of 2688 2744 Au_.exe 31 PID 2744 wrote to memory of 2688 2744 Au_.exe 31 PID 2744 wrote to memory of 2688 2744 Au_.exe 31 PID 2744 wrote to memory of 2192 2744 Au_.exe 32 PID 2744 wrote to memory of 2192 2744 Au_.exe 32 PID 2744 wrote to memory of 2192 2744 Au_.exe 32 PID 2744 wrote to memory of 2192 2744 Au_.exe 32 PID 2744 wrote to memory of 3048 2744 Au_.exe 33 PID 2744 wrote to memory of 3048 2744 Au_.exe 33 PID 2744 wrote to memory of 3048 2744 Au_.exe 33 PID 2744 wrote to memory of 3048 2744 Au_.exe 33 PID 2744 wrote to memory of 2716 2744 Au_.exe 34 PID 2744 wrote to memory of 2716 2744 Au_.exe 34 PID 2744 wrote to memory of 2716 2744 Au_.exe 34 PID 2744 wrote to memory of 2716 2744 Au_.exe 34 PID 2744 wrote to memory of 2716 2744 Au_.exe 34 PID 2744 wrote to memory of 2716 2744 Au_.exe 34 PID 2744 wrote to memory of 2716 2744 Au_.exe 34 PID 2716 wrote to memory of 2096 2716 WebInstaller.exe 35 PID 2716 wrote to memory of 2096 2716 WebInstaller.exe 35 PID 2716 wrote to memory of 2096 2716 WebInstaller.exe 35 PID 2716 wrote to memory of 2096 2716 WebInstaller.exe 35 PID 2716 wrote to memory of 2096 2716 WebInstaller.exe 35 PID 2716 wrote to memory of 2096 2716 WebInstaller.exe 35 PID 2716 wrote to memory of 2096 2716 WebInstaller.exe 35 PID 2744 wrote to memory of 2656 2744 Au_.exe 36 PID 2744 wrote to memory of 2656 2744 Au_.exe 36 PID 2744 wrote to memory of 2656 2744 Au_.exe 36 PID 2744 wrote to memory of 2656 2744 Au_.exe 36 PID 2584 wrote to memory of 2724 2584 taskeng.exe 38 PID 2584 wrote to memory of 2724 2584 taskeng.exe 38 PID 2584 wrote to memory of 2724 2584 taskeng.exe 38 PID 2584 wrote to memory of 2724 2584 taskeng.exe 38 PID 2744 wrote to memory of 1848 2744 Au_.exe 39 PID 2744 wrote to memory of 1848 2744 Au_.exe 39 PID 2744 wrote to memory of 1848 2744 Au_.exe 39 PID 2744 wrote to memory of 1848 2744 Au_.exe 39 PID 2744 wrote to memory of 2244 2744 Au_.exe 40 PID 2744 wrote to memory of 2244 2744 Au_.exe 40 PID 2744 wrote to memory of 2244 2744 Au_.exe 40 PID 2744 wrote to memory of 2244 2744 Au_.exe 40 PID 2744 wrote to memory of 2244 2744 Au_.exe 40 PID 2744 wrote to memory of 2244 2744 Au_.exe 40 PID 2744 wrote to memory of 2244 2744 Au_.exe 40 PID 2744 wrote to memory of 2272 2744 Au_.exe 41 PID 2744 wrote to memory of 2272 2744 Au_.exe 41 PID 2744 wrote to memory of 2272 2744 Au_.exe 41 PID 2744 wrote to memory of 2272 2744 Au_.exe 41 PID 2744 wrote to memory of 2272 2744 Au_.exe 41 PID 2744 wrote to memory of 2272 2744 Au_.exe 41 PID 2744 wrote to memory of 2272 2744 Au_.exe 41 PID 2744 wrote to memory of 1780 2744 Au_.exe 42 PID 2744 wrote to memory of 1780 2744 Au_.exe 42 PID 2744 wrote to memory of 1780 2744 Au_.exe 42 PID 2744 wrote to memory of 1780 2744 Au_.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\AdminWorker.exe"C:\Users\Admin\AppData\Local\Temp\AdminWorker.exe" DelArcadeFromFireWallExceptions3⤵
- System Location Discovery: System Language Discovery
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\AdminWorker.exe"C:\Users\Admin\AppData\Local\Temp\AdminWorker.exe" convertShortcutsToLinks3⤵
- System Location Discovery: System Language Discovery
PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\iWinTrusted.exe"C:\Users\Admin\AppData\Local\Temp\iWinTrusted.exe" -remove3⤵
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\WebInstaller.exe"C:\Users\Admin\AppData\Local\Temp\WebInstaller.exe" -uninstall3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s /u "C:\Users\Admin\AppData\Local\Temp\iWinGamesHookIE.dll"4⤵
- System Location Discovery: System Language Discovery
PID:2096
-
-
-
C:\Users\Admin\AppData\Local\Temp\iWinGames.exe"C:\Users\Admin\AppData\Local\Temp\iWinGames.exe" /trackArcadeUninstall_reason_03⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\AdminWorker.exe"C:\Users\Admin\AppData\Local\Temp\AdminWorker.exe" uninstallDesktopAlerts3⤵
- System Location Discovery: System Language Discovery
PID:1848
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /u "C:\Users\Admin\AppData\Local\Temp\iWinGamesHookIE.dll"3⤵
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /u "C:\Users\Admin\AppData\Local\Temp\iWinInfo.dll"3⤵
- System Location Discovery: System Language Discovery
PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\AdminWorker.exe"C:\Users\Admin\AppData\Local\Temp\AdminWorker.exe" KillProcess iWinGames.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {ECBB2FD9-3B2F-4A6B-9A15-9C7477705316} S-1-5-21-1506706701-1246725540-2219210854-1000:MUYDDIIS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\iWinGames.exeC:\Users\Admin\AppData\Local\Temp\iWinGames.exe /trackArcadeUninstall_reason_02⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5bb7ed86fc243e98d945d2ff2e66a88e0
SHA1de9697578bf7ab47c5b175cc4ba3c664e975de9f
SHA256b4f2db172432dd1853db60dc8169d1c4fa601968e2fe66e744813ccaa7d0a21c
SHA512e8222b69e1350c4736f969c7c6de233cc6f8e48e5c43723761eb1dba853188447e0e91203e27b9f242113ffe1470ad7e904a979c1cf3187789175d7f28129b67
-
Filesize
94KB
MD54d3ac88054df63fc810427bdaa96c458
SHA1e4d554e03ba91f6b53a2a80253b339f56e303c94
SHA256b07ffcd0af80f6b9fba09abe816ba2f0ff0d336639f1768fc317291bc635ece6
SHA512d4732ad89bbb19b316dff1b9c534acf98bb985c89d1295f08e24b21531123426500b3712979dda2f0e941a5969c0cbca15bbd52f6c167653f96a494a6677ca54
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
129KB
MD549c9d6cadd02bfff54851d0b0cafd557
SHA19bb1dbff1ff7fcf171610133354ffeab1f522d82
SHA256c7550a63d4547fb15d9eb84b10bd7ed68e71e860604da1b7fd3c375ce58f0cbe
SHA512c982f388f605bbdb784b04078a2e2cce7794867b45cc89359425efa7ab3101ba9410b3867554da0f2ebc62895e8ed0ff6211fb1e0408860962907a49942f76eb