Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3dca448f8d1...18.exe
windows7-x64
7dca448f8d1...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Jigsaw.dll
windows7-x64
1Jigsaw.dll
windows10-2004-x64
1JigsawBeac...ay.exe
windows7-x64
3JigsawBeac...ay.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3aminstall.dll
windows7-x64
3aminstall.dll
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 16:48
Static task
static1
Behavioral task
behavioral1
Sample
dca448f8d15896627b753a0233dedc87_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dca448f8d15896627b753a0233dedc87_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Jigsaw.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Jigsaw.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
JigsawBeachHoliday.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
JigsawBeachHoliday.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
aminstall.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
aminstall.dll
Resource
win10v2004-20240802-en
General
-
Target
Uninstall.exe
-
Size
89KB
-
MD5
9111cd15ae20e9466f9f849b7af57ca1
-
SHA1
416420588d49d2a12ad61b6bac94a22be1e1c7fb
-
SHA256
226324be5f0a18c000a6ee22f7083eb4997a10b5778e274fd86ed876e94ad8fd
-
SHA512
ffc4bbe5be308fa36a33678616025a6af3d7ae4b15eaa6991d082ba8d89a1fb5c39bd961f776aff532f2aec88238b699eea20dfa1132a5ce80da32f3613f0b48
-
SSDEEP
1536:sUqBWUSFNrdN90DukJrXVXmXeUv+yLPrulXytFDOpFAM:PGW3B+DukJrF2OorLDulibE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2772 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 2700 Uninstall.exe 2772 Au_.exe 2772 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral13/files/0x0005000000019c59-2.dat nsis_installer_1 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2772 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2772 2700 Uninstall.exe 31 PID 2700 wrote to memory of 2772 2700 Uninstall.exe 31 PID 2700 wrote to memory of 2772 2700 Uninstall.exe 31 PID 2700 wrote to memory of 2772 2700 Uninstall.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
595B
MD5871d597e1d145fde9241c9bad091fd0e
SHA1377ae6e9fc1f89a7dc113fe3930a7d3cbdd3dda5
SHA25644bb1b99655a5b4a05ccd7376d5db6e8e9b00e04ee62cdcea44b83a1368d8655
SHA5128cc9a976005c9248211a8242d375efeb59065ed0acbe2d712c090f8d599bb86b4942b0d06d5761cacbfce8527c1cd6cd54cf0c5919b8073812c770ea98ef8270
-
Filesize
634B
MD5a0bff8f775e60a93ab5e2808c37a85a0
SHA1053a494445badf46f0f80f45a73704450558ba91
SHA256b00e50821b07e4345cf998d336e563e8254a0fad1386a3bd8df73faabf55127a
SHA5128ba4fe18120c8af1eab6803a0b35ffde9d0cd15a60f59b7fe4ca69f2382e771a790d7d6974d686cdf9df4afc9cbcd0e9d562cf96ad8ed93628b4797b01678d1d
-
Filesize
12KB
MD529459d9ee2bce32ed937fb1f965f9d5e
SHA18fff45ed45f3af8f8c248eba9a1c02c9c5fc911d
SHA256ad07968b7d93ef19e10e1deb52e0c912e96dde30c0a49a0239daf176fd4c9ef5
SHA512d4ef4eadb0f53e7086a1d242bf7f745ad79d83d9ecbfaa283cf0dd499271a804589a575040bb20d5c98e86197cc65ca05ab1a358c556ea82a3e297d0255015a6
-
Filesize
10KB
MD505e52213cfa17dee760186462a9645ed
SHA1f6d5e82080bbba65db7d54e89250c95af833aae3
SHA256d9d3ffa4c7d7a152f435f4777e72aa1b6a6c0555f277e59eedebc587c3b66ba5
SHA512586eea0bec6345b437667ce528bc2396427dd444a396456e38046a8962e92a52e7ee62b9f6c97f41bc1fb4a1b3905a302d6f7055e26b84e60709ba3b416ad172
-
Filesize
89KB
MD59111cd15ae20e9466f9f849b7af57ca1
SHA1416420588d49d2a12ad61b6bac94a22be1e1c7fb
SHA256226324be5f0a18c000a6ee22f7083eb4997a10b5778e274fd86ed876e94ad8fd
SHA512ffc4bbe5be308fa36a33678616025a6af3d7ae4b15eaa6991d082ba8d89a1fb5c39bd961f776aff532f2aec88238b699eea20dfa1132a5ce80da32f3613f0b48