Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3d16f1c4285...18.exe
windows7-x64
7d16f1c4285...18.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$TEMP/PlayMYDVD.exe
windows7-x64
3$TEMP/PlayMYDVD.exe
windows10-2004-x64
7Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 07:52
Static task
static1
Behavioral task
behavioral1
Sample
d16f1c428531f29b78f171ba28540ce5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d16f1c428531f29b78f171ba28540ce5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/PlayMYDVD.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$TEMP/PlayMYDVD.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
General
-
Target
Uninstall.exe
-
Size
66KB
-
MD5
a9288e973ae497c007fbe2d38a0d7482
-
SHA1
2dde89cea40b642cac36663c4269dcca5b7bf66f
-
SHA256
4d79f805439bb0d4ac2c610d017703d52a186291df2a0c85461b0d23a311b29a
-
SHA512
37461c737225ee91fa9e7377ab1fa9f1bef20cf3eb7dd18b57db2b01ac0806cc89e1b92e68d9881455285a6933422fed21eaf040ff6491ff02aafa4b6f1c6154
-
SSDEEP
1536:97ANUHtHV6AWzwfFJUPfT4t3kUYp+djPw6RqRigBJbczgs:9TvfTzcTsw6R9gBbs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2388 Au_.exe -
Loads dropped DLL 4 IoCs
pid Process 2176 Uninstall.exe 2388 Au_.exe 2388 Au_.exe 2388 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral7/files/0x0006000000018d68-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2388 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2388 2176 Uninstall.exe 30 PID 2176 wrote to memory of 2388 2176 Uninstall.exe 30 PID 2176 wrote to memory of 2388 2176 Uninstall.exe 30 PID 2176 wrote to memory of 2388 2176 Uninstall.exe 30 PID 2176 wrote to memory of 2388 2176 Uninstall.exe 30 PID 2176 wrote to memory of 2388 2176 Uninstall.exe 30 PID 2176 wrote to memory of 2388 2176 Uninstall.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5a9288e973ae497c007fbe2d38a0d7482
SHA12dde89cea40b642cac36663c4269dcca5b7bf66f
SHA2564d79f805439bb0d4ac2c610d017703d52a186291df2a0c85461b0d23a311b29a
SHA51237461c737225ee91fa9e7377ab1fa9f1bef20cf3eb7dd18b57db2b01ac0806cc89e1b92e68d9881455285a6933422fed21eaf040ff6491ff02aafa4b6f1c6154