Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
72748a6ddc4...18.exe
windows7-x64
72748a6ddc4...18.exe
windows10-2004-x64
7$PLUGINSDI...ig.dll
windows7-x64
3$PLUGINSDI...ig.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...el.dll
windows7-x64
7$PLUGINSDI...el.dll
windows10-2004-x64
7$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDIR/fct.dll
windows7-x64
3$PLUGINSDIR/fct.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3FineTop.dll
windows7-x64
6FineTop.dll
windows10-2004-x64
6FineTop.exe
windows7-x64
6FineTop.exe
windows10-2004-x64
6adc.dll
windows7-x64
3adc.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 23:49
Behavioral task
behavioral1
Sample
2748a6ddc425bf3abc087daadb3704f2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2748a6ddc425bf3abc087daadb3704f2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/IpConfig.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/IpConfig.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/fct.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/fct.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
FineTop.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
FineTop.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
FineTop.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
FineTop.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
adc.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
adc.dll
Resource
win10v2004-20241007-en
General
-
Target
FineTop.exe
-
Size
42KB
-
MD5
61c81941b91b1d502971bd42a29806a1
-
SHA1
72ee7b2fb665f01415a00267cbc1a5d385d1f0cf
-
SHA256
6e0d4e65b147d69b249c40c1f9cc5ea82ae3179777bd25462eef3449d3bbbdb8
-
SHA512
0583df8495ed3c252713bfa2b0b38b9a2aac8ce22ed5e50e42cf5a7d94e903e605614a5ab507a0b10497f434759c945eec7ae1f124f530fe3d488f4ec661de7f
-
SSDEEP
384:kVhtux58TuX+ON45/EoF0naexusdPq18W/07c4xp5/SYJLuPkCQub:kVhtY8TuZN45NF0rnkH/0A4x/7LuD
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FineTop = "C:\\Users\\Admin\\AppData\\Local\\Temp\\FineTop.exe" FineTop.exe -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{CBF53489-AD8D-4637-965A-413861EEC7CF} regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FineTop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\Main\TabProcGrowth = "0" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\TabProcGrowth = "0" regsvr32.exe -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3E54C6DC-A2C6-404C-A36F-DE346281B3A7}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3E54C6DC-A2C6-404C-A36F-DE346281B3A7}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FineTop.TopBand.1\ = "TopBand Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FineTop.TopBand\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FineTop.TopBand\CLSID\ = "{CBF53489-AD8D-4637-965A-413861EEC7CF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CBF53489-AD8D-4637-965A-413861EEC7CF}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3E54C6DC-A2C6-404C-A36F-DE346281B3A7}\1.0\ = "FineTop 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3E54C6DC-A2C6-404C-A36F-DE346281B3A7}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F1AACA8D-4899-4D6C-B360-403A5A20B5D2}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CBF53489-AD8D-4637-965A-413861EEC7CF} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CBF53489-AD8D-4637-965A-413861EEC7CF}\ProgID\ = "FineTop.TopBand.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CBF53489-AD8D-4637-965A-413861EEC7CF}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3E54C6DC-A2C6-404C-A36F-DE346281B3A7} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F1AACA8D-4899-4D6C-B360-403A5A20B5D2}\ = "ITopBand" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F1AACA8D-4899-4D6C-B360-403A5A20B5D2}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F1AACA8D-4899-4D6C-B360-403A5A20B5D2}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F1AACA8D-4899-4D6C-B360-403A5A20B5D2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F1AACA8D-4899-4D6C-B360-403A5A20B5D2}\ = "ITopBand" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FineTop.TopBand\CurVer\ = "FineTop.TopBand.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F1AACA8D-4899-4D6C-B360-403A5A20B5D2} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CBF53489-AD8D-4637-965A-413861EEC7CF}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3E54C6DC-A2C6-404C-A36F-DE346281B3A7}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3E54C6DC-A2C6-404C-A36F-DE346281B3A7}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\FineTop.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F1AACA8D-4899-4D6C-B360-403A5A20B5D2}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F1AACA8D-4899-4D6C-B360-403A5A20B5D2}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F1AACA8D-4899-4D6C-B360-403A5A20B5D2}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FineTop.TopBand.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FineTop.TopBand.1\CLSID\ = "{CBF53489-AD8D-4637-965A-413861EEC7CF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FineTop.TopBand\ = "TopBand Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CBF53489-AD8D-4637-965A-413861EEC7CF}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CBF53489-AD8D-4637-965A-413861EEC7CF}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CBF53489-AD8D-4637-965A-413861EEC7CF}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CBF53489-AD8D-4637-965A-413861EEC7CF}\ = "FineTop" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F1AACA8D-4899-4D6C-B360-403A5A20B5D2}\TypeLib\ = "{3E54C6DC-A2C6-404C-A36F-DE346281B3A7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F1AACA8D-4899-4D6C-B360-403A5A20B5D2}\TypeLib\ = "{3E54C6DC-A2C6-404C-A36F-DE346281B3A7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F1AACA8D-4899-4D6C-B360-403A5A20B5D2}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3E54C6DC-A2C6-404C-A36F-DE346281B3A7}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3E54C6DC-A2C6-404C-A36F-DE346281B3A7}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FineTop.TopBand.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FineTop.TopBand regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FineTop.TopBand\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CBF53489-AD8D-4637-965A-413861EEC7CF}\VersionIndependentProgID\ = "FineTop.TopBand" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CBF53489-AD8D-4637-965A-413861EEC7CF}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\FineTop.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CBF53489-AD8D-4637-965A-413861EEC7CF}\TypeLib\ = "{3E54C6DC-A2C6-404C-A36F-DE346281B3A7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3E54C6DC-A2C6-404C-A36F-DE346281B3A7}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F1AACA8D-4899-4D6C-B360-403A5A20B5D2}\TypeLib regsvr32.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe 1680 FineTop.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1680 wrote to memory of 4944 1680 FineTop.exe 86 PID 1680 wrote to memory of 4944 1680 FineTop.exe 86 PID 1680 wrote to memory of 4944 1680 FineTop.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\FineTop.exe"C:\Users\Admin\AppData\Local\Temp\FineTop.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\FineTop.dll"2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:4944
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1