Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
9Static
static
9d213c111b8...18.exe
windows7-x64
7d213c111b8...18.exe
windows10-2004-x64
7$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...om.dll
windows7-x64
7$PLUGINSDI...om.dll
windows10-2004-x64
7$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3$TEMP/v.vbs
windows7-x64
3$TEMP/v.vbs
windows10-2004-x64
3$TEMP/xcmd.exe
windows7-x64
9$TEMP/xcmd.exe
windows10-2004-x64
9$_48_/$APP...md.exe
windows7-x64
9$_48_/$APP...md.exe
windows10-2004-x64
9$_48_/1.html
windows7-x64
3$_48_/1.html
windows10-2004-x64
3$_48_/3.bat
windows7-x64
1$_48_/3.bat
windows10-2004-x64
1$_48_/3.vbs
windows7-x64
4$_48_/3.vbs
windows10-2004-x64
7$_48_/qq.vbs
windows7-x64
3$_48_/qq.vbs
windows10-2004-x64
7Analysis
-
max time kernel
98s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 13:49
Behavioral task
behavioral1
Sample
d213c111b804b50b5d595556e6383cb5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d213c111b804b50b5d595556e6383cb5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/MakeDll.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/MakeDll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/registry.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/registry.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$TEMP/v.vbs
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
$TEMP/v.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$TEMP/xcmd.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$TEMP/xcmd.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$_48_/$APPDATA/xcmd.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$_48_/$APPDATA/xcmd.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$_48_/1.html
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$_48_/1.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$_48_/3.bat
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
$_48_/3.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$_48_/3.vbs
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$_48_/3.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$_48_/qq.vbs
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
$_48_/qq.vbs
Resource
win10v2004-20240802-en
General
-
Target
$_48_/qq.vbs
-
Size
970B
-
MD5
4e6e43ad10ef6a77d9b01eec44a661ae
-
SHA1
b510f3c86fe70bb7ab0751102e7f0720e8d9ca27
-
SHA256
e8d3bdbb274c77337943799adbb05bbdac8e686ebc6e20bb8a343e92a68af497
-
SHA512
51f7b8d106fe1de87f9e8f826eda05cb353c375ae6e82d82ec6d4c19df946e0183ce2cd6776067c1923d6cdd8001b90582f40f1ff293988c34d4a3025a2fb80a
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 512 wrote to memory of 3120 512 WScript.exe 84 PID 512 wrote to memory of 3120 512 WScript.exe 84 PID 512 wrote to memory of 4084 512 WScript.exe 86 PID 512 wrote to memory of 4084 512 WScript.exe 86 PID 4084 wrote to memory of 4752 4084 cmd.exe 88 PID 4084 wrote to memory of 4752 4084 cmd.exe 88 PID 4084 wrote to memory of 1956 4084 cmd.exe 89 PID 4084 wrote to memory of 1956 4084 cmd.exe 89 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3120 attrib.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\$_48_\qq.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" "C:\Program Files\NetMeeting\ie.html" +R2⤵
- Views/modifies file attributes
PID:3120
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y| cacls "C:\Program Files\NetMeeting\ie.html" /P Everyone:R2⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4752
-
-
C:\Windows\system32\cacls.execacls "C:\Program Files\NetMeeting\ie.html" /P Everyone:R3⤵PID:1956
-
-