Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3dfde735280...18.exe
windows7-x64
7dfde735280...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...cc.exe
windows7-x64
3$PLUGINSDI...cc.exe
windows10-2004-x64
3$PLUGINSDI...ok.dll
windows7-x64
3$PLUGINSDI...ok.dll
windows10-2004-x64
3$PLUGINSDI...ll.bat
windows7-x64
6$PLUGINSDI...ll.bat
windows10-2004-x64
6Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 09:00
Static task
static1
Behavioral task
behavioral1
Sample
dfde735280cb0ead0d7e8ed2f2205ad0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfde735280cb0ead0d7e8ed2f2205ad0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/bomgar-scc.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/bomgar-scc.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nstvhook.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nstvhook.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/uninstall.bat
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/uninstall.bat
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/uninstall.bat
-
Size
34B
-
MD5
0a66071b4436ed915697bfd252d02cf7
-
SHA1
f864686282191d807d993a52dab62e019699161f
-
SHA256
4de0cef8290d5f6186070e1430c5ace5766c0d2833aaf34fc71f086d5dd6a1ed
-
SHA512
1a9e6732119d4d65e81a9537a96a06f2f099ec62f2485657e652f4b38067ac4b566553c638512ca4d4a369404caa7f18f26fb6d5f182663c785669995dd9ed78
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bomgar_Cleanup_ZD24063423415724 = "cmd.exe /C rd /S /Q \"C:\\Users\\Admin\\AppData\\Local\\Temp\\$PLUGINSDIR\" & reg delete HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run /v Bomgar_Cleanup_ZD24063423415724 /f" bomgar-scc.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bomgar-scc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4424 bomgar-scc.exe 4424 bomgar-scc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2236 wrote to memory of 4424 2236 cmd.exe 84 PID 2236 wrote to memory of 4424 2236 cmd.exe 84 PID 2236 wrote to memory of 4424 2236 cmd.exe 84
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\uninstall.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\bomgar-scc.exebomgar-scc.exe -uninstall silent2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26B
MD593b1fbb3c4c8be07a6815fecce322a86
SHA1420aa61aaad08ef2a76a419302061ef9961044db
SHA256ae55e9cb6678facb36459c835a67579e23080ed1d78bb19d4a6ca1e67c4d7cb0
SHA51250d7e8a925a2f5b9ba9bd409a7e1c4861d833f245685e814da19f585ed67f2982d627b18a69b338e1ae4827a8b204b8c7811641653457717f36d317f9f11a8a9