Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
3dc543ffe00...18.exe
windows7-x64
7dc543ffe00...18.exe
windows10-2004-x64
7$PLUGINSDI...gy.exe
windows7-x64
7$PLUGINSDI...gy.exe
windows10-2004-x64
8$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ro.exe
windows7-x64
7$PLUGINSDI...ro.exe
windows10-2004-x64
7$PLUGINSDI...FC.dll
windows7-x64
3$PLUGINSDI...FC.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
37ZipBuilder.dll
windows7-x64
37ZipBuilder.dll
windows10-2004-x64
37zxa.dll
windows7-x64
37zxa.dll
windows10-2004-x64
3BugTrap.dll
windows7-x64
3BugTrap.dll
windows10-2004-x64
3DocumentReader.dll
windows7-x64
3DocumentReader.dll
windows10-2004-x64
3GFLImageServices.dll
windows7-x64
3GFLImageServices.dll
windows10-2004-x64
3GFLLibraryBuilder.dll
windows7-x64
3GFLLibraryBuilder.dll
windows10-2004-x64
3GeoIP.dll
windows7-x64
3GeoIP.dll
windows10-2004-x64
3HashLib.dll
windows7-x64
3HashLib.dll
windows10-2004-x64
3ImageViewer.dll
windows7-x64
3ImageViewer.dll
windows10-2004-x64
3MediaImage...es.exe
windows7-x64
1MediaImage...es.exe
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
dc543ffe00d73f7bafc2e91116d75b6c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc543ffe00d73f7bafc2e91116d75b6c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Download_Energy.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Download_Energy.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/ProsperasoftwareAcPro.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/ProsperasoftwareAcPro.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/SimpleFC.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/SimpleFC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
7ZipBuilder.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
7ZipBuilder.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
7zxa.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
7zxa.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
BugTrap.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
BugTrap.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
DocumentReader.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
DocumentReader.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
GFLImageServices.dll
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
GFLImageServices.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
GFLLibraryBuilder.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
GFLLibraryBuilder.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
GeoIP.dll
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
GeoIP.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
HashLib.dll
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
HashLib.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
ImageViewer.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
ImageViewer.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
MediaImageServices.exe
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
MediaImageServices.exe
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/Download_Energy.exe
-
Size
5.1MB
-
MD5
96a9c13cdb1c931c8d232dddf929a6ac
-
SHA1
7f29702918924cd1b9bd943fa0eaafecaeab4c75
-
SHA256
468eca855754732e658ac1d2ac677a9105f5c62580989f53295e6827232dfc68
-
SHA512
97dba7c1dd0f8a2bcd3afe92730f20d0171126e1ae0cd1f2218cbb91d0caae298b90bf7950733ff8c7a42daa8b5a747d7c9e00045a0ff73697b2a7bf66c11dd3
-
SSDEEP
98304:MHopKHIn2zDWnuL0uKVFWM1fYPSM03CNl4rDWd4u3czc1exjMtbQt:UCyDWuL0uKPWYfxn3CNk4eitG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2768 GLBEC71.tmp -
Loads dropped DLL 3 IoCs
pid Process 3052 Download_Energy.exe 2768 GLBEC71.tmp 2768 GLBEC71.tmp -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\GLBSINST.%$D GLBEC71.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Download_Energy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLBEC71.tmp -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\C:\Users\Admin\AppData\Local\Temp\INSTALL.LOG GLBEC71.tmp File created C:\C:\Users\Admin\AppData\Local\Temp\INSTALL.LOG GLBEC71.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2768 3052 Download_Energy.exe 31 PID 3052 wrote to memory of 2768 3052 Download_Energy.exe 31 PID 3052 wrote to memory of 2768 3052 Download_Energy.exe 31 PID 3052 wrote to memory of 2768 3052 Download_Energy.exe 31 PID 3052 wrote to memory of 2768 3052 Download_Energy.exe 31 PID 3052 wrote to memory of 2768 3052 Download_Energy.exe 31 PID 3052 wrote to memory of 2768 3052 Download_Energy.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Download_Energy.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Download_Energy.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\GLBEC71.tmpC:\Users\Admin\AppData\Local\Temp\GLBEC71.tmp 4736 C:\Users\Admin\AppData\Local\Temp\$PLUGI~1\DOWNLO~1.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD512457304fe66ac4b06e940451a476d0f
SHA15d2b4dead64e175c7f8a66d9a3e0f4f1c0796e9c
SHA2566fd48e58a9904869fc4edc94817ce771d3aee46f5e4558bab99c432afd1dc8ce
SHA512cb947b259d42704252c61658d75998c651272855878552831a20d79e6f4838b2f0d78af14b03e7f575638fa7e38259d87fb01d23856d020b5fbdb134e7a54be1
-
Filesize
161KB
MD58c97d8bb1470c6498e47b12c5a03ce39
SHA115d233b22f1c3d756dca29bcc0021e6fb0b8cdf7
SHA256a87f19f9fee475d2b2e82acfb4589be6d816b613064cd06826e1d4c147beb50a
SHA5127ad0b2b0319da52152c2595ee45045d0c06b157cdaaa56ad57dde9736be3e45fd7357949126f80d3e72b21510f9bf69d010d51b3967a7644662808beed067c3f
-
Filesize
33KB
MD5517419cae37f6c78c80f9b7d0fbb8661
SHA1a9e419f3d9ef589522556e0920c84fe37a548873
SHA256bfe7e013cfb85e78b994d3ad34eca08286494a835cb85f1d7bced3df6fe93a11
SHA5125046565443cf463b6fa4d2d5868879efc6a9db969bf05e3c80725b99bd091ce062cfe66c5551eb1cc5f00a38f2cfcda1f36fb4d60d9ff816c4ec3107b5a0df40