Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3d16f1c4285...18.exe
windows7-x64
7d16f1c4285...18.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$TEMP/PlayMYDVD.exe
windows7-x64
3$TEMP/PlayMYDVD.exe
windows10-2004-x64
7Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 07:52
Static task
static1
Behavioral task
behavioral1
Sample
d16f1c428531f29b78f171ba28540ce5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d16f1c428531f29b78f171ba28540ce5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/PlayMYDVD.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$TEMP/PlayMYDVD.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
General
-
Target
d16f1c428531f29b78f171ba28540ce5_JaffaCakes118.exe
-
Size
168KB
-
MD5
d16f1c428531f29b78f171ba28540ce5
-
SHA1
325e7ca948df718456b400537818275385f62eb4
-
SHA256
6767f33dd2c515e664a51b0d2df91f9c7f46b3c35c362949603ed3a3b9fa7f10
-
SHA512
f68fc0c83a509b312629c71696ce8bfd3e7fb9311e76e2e826f77b699bbd1029888f29ee40367b717d0e971aadafd01161ac4f6d40995ea850be25b9dc93dc5c
-
SSDEEP
3072:9TvfTzcTsw6R9gB3qGRIuvwCQ4Mh/FDLfr/oQ0pQB+PfaT6Pc:JvfTwQwDqGz44S/xLfrABpQB+U5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2116 PlayMYDVD.exe -
Loads dropped DLL 8 IoCs
pid Process 2124 d16f1c428531f29b78f171ba28540ce5_JaffaCakes118.exe 2124 d16f1c428531f29b78f171ba28540ce5_JaffaCakes118.exe 2116 PlayMYDVD.exe 2116 PlayMYDVD.exe 2116 PlayMYDVD.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2628 2116 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d16f1c428531f29b78f171ba28540ce5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PlayMYDVD.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2116 PlayMYDVD.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2116 2124 d16f1c428531f29b78f171ba28540ce5_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2116 2124 d16f1c428531f29b78f171ba28540ce5_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2116 2124 d16f1c428531f29b78f171ba28540ce5_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2116 2124 d16f1c428531f29b78f171ba28540ce5_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2116 2124 d16f1c428531f29b78f171ba28540ce5_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2116 2124 d16f1c428531f29b78f171ba28540ce5_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2116 2124 d16f1c428531f29b78f171ba28540ce5_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2628 2116 PlayMYDVD.exe 31 PID 2116 wrote to memory of 2628 2116 PlayMYDVD.exe 31 PID 2116 wrote to memory of 2628 2116 PlayMYDVD.exe 31 PID 2116 wrote to memory of 2628 2116 PlayMYDVD.exe 31 PID 2116 wrote to memory of 2628 2116 PlayMYDVD.exe 31 PID 2116 wrote to memory of 2628 2116 PlayMYDVD.exe 31 PID 2116 wrote to memory of 2628 2116 PlayMYDVD.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d16f1c428531f29b78f171ba28540ce5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d16f1c428531f29b78f171ba28540ce5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\PlayMYDVD.exeC:\Users\Admin\AppData\Local\Temp\PlayMYDVD.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 7363⤵
- Loads dropped DLL
- Program crash
PID:2628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD57a2410800053b1cfe14977bca3f61776
SHA17c8a206df5e451900b3fd76395ebd0572d7e62a1
SHA25662fd751a38f08963862d3a37cc9598949ba6fff8c4fb9da64c0f2a45bb163704
SHA512c26e06d7551829c85c074d6704f90543e8c32b122b0d17e46bcf0a242e02f47025f2f9e80e089497730767c5253464b4e374090188783fb7a5730e3f271492a9