Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3fc238d5603...18.exe
windows7-x64
7fc238d5603...18.exe
windows10-2004-x64
7$PLUGINSDI...EN.exe
windows7-x64
3$PLUGINSDI...EN.exe
windows10-2004-x64
3$PLUGINSDI...er.exe
windows7-x64
3$PLUGINSDI...er.exe
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3AdminWorker.exe
windows7-x64
3AdminWorker.exe
windows10-2004-x64
3WebInstaller.exe
windows7-x64
6WebInstaller.exe
windows10-2004-x64
6WebUpdater.exe
windows7-x64
3WebUpdater.exe
windows10-2004-x64
3content/iwa-ovr.js
windows7-x64
3content/iwa-ovr.js
windows10-2004-x64
3firefox/iW...er.exe
windows7-x64
3firefox/iW...er.exe
windows10-2004-x64
3iWinGames.exe
windows7-x64
7iWinGames.exe
windows10-2004-x64
7iWinGamesHookIE.dll
windows7-x64
6iWinGamesHookIE.dll
windows10-2004-x64
6iWinGamesI...er.exe
windows7-x64
3iWinGamesI...er.exe
windows10-2004-x64
3pages/blank.html
windows7-x64
3pages/blank.html
windows10-2004-x64
3pages/blank2.html
windows7-x64
3pages/blank2.html
windows10-2004-x64
3pages/error.html
windows7-x64
3pages/error.html
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
fc238d56038e9e5094038122ab07f016_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc238d56038e9e5094038122ab07f016_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/GoogleInstAppTB_EN.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/GoogleInstAppTB_EN.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstGameInfoHelper.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstGameInfoHelper.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
AdminWorker.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
AdminWorker.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
WebInstaller.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
WebInstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
WebUpdater.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
WebUpdater.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
content/iwa-ovr.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
content/iwa-ovr.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
firefox/iWinArcadeLauncher.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
firefox/iWinArcadeLauncher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
iWinGames.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
iWinGames.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
iWinGamesHookIE.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
iWinGamesHookIE.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
iWinGamesInstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
iWinGamesInstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
pages/blank.html
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
pages/blank.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
pages/blank2.html
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
pages/blank2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
pages/error.html
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
pages/error.html
Resource
win10v2004-20240802-en
General
-
Target
fc238d56038e9e5094038122ab07f016_JaffaCakes118.exe
-
Size
3.2MB
-
MD5
fc238d56038e9e5094038122ab07f016
-
SHA1
a6eb33748cf13f597e58f6d54e07dde03f5d041f
-
SHA256
15be226231ee990233f181c74ad81a71205dcad0d212f33acf6c997f2867462f
-
SHA512
76cad4bae7cb4c54c3b6ccbba6fc0e2d6511c8dbca07ae15738f4216c0e37be15e3a73b0b9a2fa4fd4be38d088694f2528a3f7fc3a313b4eb2c87a462a6b49a1
-
SSDEEP
98304:zvtgs39n1t0udUbvSIzHqxrweXZFhmU5j3sY:zvSs39nT7ivPKVtmd
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4100 ns860A.tmp 4704 InstGameInfoHelper.exe -
Loads dropped DLL 2 IoCs
pid Process 3876 fc238d56038e9e5094038122ab07f016_JaffaCakes118.exe 3876 fc238d56038e9e5094038122ab07f016_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc238d56038e9e5094038122ab07f016_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ns860A.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstGameInfoHelper.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3876 wrote to memory of 4100 3876 fc238d56038e9e5094038122ab07f016_JaffaCakes118.exe 82 PID 3876 wrote to memory of 4100 3876 fc238d56038e9e5094038122ab07f016_JaffaCakes118.exe 82 PID 3876 wrote to memory of 4100 3876 fc238d56038e9e5094038122ab07f016_JaffaCakes118.exe 82 PID 4100 wrote to memory of 4704 4100 ns860A.tmp 84 PID 4100 wrote to memory of 4704 4100 ns860A.tmp 84 PID 4100 wrote to memory of 4704 4100 ns860A.tmp 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc238d56038e9e5094038122ab07f016_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc238d56038e9e5094038122ab07f016_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\nsp85EA.tmp\ns860A.tmp"C:\Users\Admin\AppData\Local\Temp\nsp85EA.tmp\ns860A.tmp" "C:\Users\Admin\AppData\Local\Temp\nsp85EA.tmp\InstGameInfoHelper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\nsp85EA.tmp\InstGameInfoHelper.exe"C:\Users\Admin\AppData\Local\Temp\nsp85EA.tmp\InstGameInfoHelper.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD5ec08c1c867ded8f5221aefb969b161c1
SHA1839866cc28b401d1d3f0f07aa8f13803f56b496a
SHA256f3bd166834e626631abe30c2353dd1c015d8b9cf6b63cf94164478e6cbf3c0be
SHA51234c35aab50e9207bdb50cb619c0882b585577b46cdd23710663dcfeceaca8b7c4248e082ad28c2718201225c42d0ad559ebd0ebe904a588d324d50d44774a7a7
-
Filesize
10KB
MD57d85b1f619a3023cc693a88f040826d2
SHA109f5d32f8143e7e0d9270430708db1b9fc8871a8
SHA256dc198967b0fb2bc7aaab0886a700c7f4d8cb346c4f9d48b9b220487b0dfe8a18
SHA5125465804c56d6251bf369609e1b44207b717228a8ac36c7992470b9daf4a231256c0ce95e0b027c4164e62d9656742a56e2b51e9347c8b17ab51ff40f32928c85
-
Filesize
512B
MD5a7d80ce4c7651bdae8bbc2e149fe76b2
SHA146724d4b90d484f12e6d0531c25c5e7abfcedfd2
SHA256b8b34eeae2da1840b5301665fd2e66def8c8a28836eb87752187f1510dc82eea
SHA5124dff4dd2f1976c5bc829821def2ae9255348864280471a3141cdf368cfbcd5ed76264a361e67e7eaedf81895324d336978a3bdabc7abb5dda2cfc18cd0494f13
-
Filesize
7B
MD5ef204df0430a7e6dc01fd819de9163cd
SHA10046d09b3d18e4bde7f8e917c5594790b27a708b
SHA2565418d8082209dd2664d8d98045dc8f05d29f4057841f63250587c71e8dd8b001
SHA5127b5cc5c1b86be312ea970ffc2b11297e7d56a152da5a3626b2c39e01b787d89e49dc93db43d1abe125ab1b706347b48a556892a84fde2736d845e27d47ffe96d
-
Filesize
6KB
MD58c05c6c4c781d8da520ab78f9a4a1c98
SHA13e883bc548fb51c8ed1880c8b91d9fd4ccfb2033
SHA2562cf3490717e10af42d7995a95cbb17df4dc7adf7ff143e9c386651c42b7a3c60
SHA512d8ba933c457a0a53434d9993995fb3e94d4297d04d1af9bffedf20485b67bba7e6ef7ea18b821ae5d85dcb09b2e71fdc015fcccc949904b80cb17d90d0e2278b
-
Filesize
6KB
MD5907db8118c510976d58a75dd9cf7d0e3
SHA190446f992946000038807d2966fd71e30e61b1c8
SHA256d166786a2091215ab6360853bc591e7045dd9bc697f45f0b19332b8d629af32e
SHA512f2afc42f03d95ef68c113cb13b47f3b027e5cf8ce7b492a4c15867d72bcd81122d2c70786c52146ac65d5b9e137ed15324b7515f089be3b3efc6711dc0c6e146
-
Filesize
243B
MD5ffa990f6cd91195745f708a74b7e0087
SHA1ddf6c6302ad2278b192313094bf7295cc9c68691
SHA256c6bbf5718fbb6c3d8c1d63a98432420a8c046201edf846d75005af80d4b7f4f3
SHA51206edbe5190ef4369831753dd4d13fca8718708cc5d95b1d1b5692259b1a9508f8d9dea235a08074bbb8ce88fba616c6602563501eb26ab7ce36691027e44bd8f