Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
512c1b32bf6...18.exe
windows7-x64
712c1b32bf6...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ur.dll
windows7-x64
3$PLUGINSDI...ur.dll
windows10-2004-x64
3uninst.exe
windows7-x64
uninst.exe
windows10-2004-x64
Analysis
-
max time kernel
10s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 09:23
Behavioral task
behavioral1
Sample
12c1b32bf60719d1ae4d4e6a92e1a3f7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
12c1b32bf60719d1ae4d4e6a92e1a3f7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/isecur.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/isecur.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
uninst.exe
Resource
win7-20240903-en
Errors
General
-
Target
uninst.exe
-
Size
25KB
-
MD5
1fa0b902733e4bd02d4df3e5f8a88e2c
-
SHA1
ee5b6aa728ec9e3bc77f3ad98b497f64bb98e2f9
-
SHA256
f22b5fc284941a8be258378c57ae1a1c89e52f871ccb0f29c2ec18ee8c888376
-
SHA512
75139436ad94520e7d44b29e3116d3ad79f0ba3946236794066ca3d8fec853b81193ef5393e764858a0c02e3bb0b7adbc6bd8d7c5d871a5e6ace602c341a6934
-
SSDEEP
768:T2d/1YcVRHJxjnaDOGKiFdWEgzyyyUyyyyyiMvc5+9a3:YtVRpxjnaaGKsUlMvcEa3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2620 Au_.exe -
resource yara_rule behavioral8/memory/4104-0-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral8/files/0x0007000000023456-4.dat upx behavioral8/memory/4104-8-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral8/memory/2620-11-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "233" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2620 Au_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2792 LogonUI.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4104 wrote to memory of 2620 4104 uninst.exe 82 PID 4104 wrote to memory of 2620 4104 uninst.exe 82 PID 4104 wrote to memory of 2620 4104 uninst.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3990855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD51fa0b902733e4bd02d4df3e5f8a88e2c
SHA1ee5b6aa728ec9e3bc77f3ad98b497f64bb98e2f9
SHA256f22b5fc284941a8be258378c57ae1a1c89e52f871ccb0f29c2ec18ee8c888376
SHA51275139436ad94520e7d44b29e3116d3ad79f0ba3946236794066ca3d8fec853b81193ef5393e764858a0c02e3bb0b7adbc6bd8d7c5d871a5e6ace602c341a6934