Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
328e9c9b769...18.exe
windows7-x64
728e9c9b769...18.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$TEMP/Toolbar.exe
windows7-x64
7$TEMP/Toolbar.exe
windows10-2004-x64
7content/aboutTabs.htm
windows7-x64
3content/aboutTabs.htm
windows10-2004-x64
3content/ctoolbar.js
windows7-x64
3content/ctoolbar.js
windows10-2004-x64
3components...rch.js
windows7-x64
3components...rch.js
windows10-2004-x64
3components...bar.js
windows7-x64
3components...bar.js
windows10-2004-x64
3components...rt.dll
windows7-x64
3components...rt.dll
windows10-2004-x64
3components...re.dll
windows7-x64
3components...re.dll
windows10-2004-x64
3defaults/fbAlert.html
windows7-x64
3defaults/fbAlert.html
windows10-2004-x64
3lib/xpcom.js
windows7-x64
3lib/xpcom.js
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
28e9c9b769c2b8a7a2a1260b3d70d3ee_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28e9c9b769c2b8a7a2a1260b3d70d3ee_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$TEMP/Toolbar.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$TEMP/Toolbar.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
content/aboutTabs.htm
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
content/aboutTabs.htm
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
content/ctoolbar.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
content/ctoolbar.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
components/ConduitAutoCompleteSearch.js
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
components/ConduitAutoCompleteSearch.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
components/ConduitToolbar.js
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
components/ConduitToolbar.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
components/FFExternalAlert.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
components/FFExternalAlert.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
components/RadioWMPCore.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
components/RadioWMPCore.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
defaults/fbAlert.html
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
defaults/fbAlert.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
lib/xpcom.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
lib/xpcom.js
Resource
win10v2004-20241007-en
General
-
Target
$TEMP/Toolbar.exe
-
Size
1.6MB
-
MD5
803f2f972e70333c04aa15e9c0aa005c
-
SHA1
b5f187f219c91799cd32e85135ee254149d2109c
-
SHA256
5bf15c1bb866744d19d845aee46b9d0129d9ac86318eee7255f23dcfeca57a17
-
SHA512
e0a9a9c8b5d71d0717afa3de781c807c7385bdd883e319a8f415bee07ad78dd6180b95b0878ec4cee4dac1e5ce3a65f9f83e5053ee86186b8955f43158fa587a
-
SSDEEP
49152:JkHP+lrdsO2gH9hPmJeuP222hl7W9ug7S5lVk/6y:+HPird12gDPmJl25hl0ukS5lVk/5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2772 GLB2CFA.tmp -
Loads dropped DLL 4 IoCs
pid Process 2716 Toolbar.exe 2772 GLB2CFA.tmp 2772 GLB2CFA.tmp 2772 GLB2CFA.tmp -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\GLBSINST.%$D GLB2CFA.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Toolbar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLB2CFA.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2772 2716 Toolbar.exe 30 PID 2716 wrote to memory of 2772 2716 Toolbar.exe 30 PID 2716 wrote to memory of 2772 2716 Toolbar.exe 30 PID 2716 wrote to memory of 2772 2716 Toolbar.exe 30 PID 2716 wrote to memory of 2772 2716 Toolbar.exe 30 PID 2716 wrote to memory of 2772 2716 Toolbar.exe 30 PID 2716 wrote to memory of 2772 2716 Toolbar.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\Toolbar.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\Toolbar.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\GLB2CFA.tmpC:\Users\Admin\AppData\Local\Temp\GLB2CFA.tmp 4736 C:\Users\Admin\AppData\Local\Temp\$TEMP\Toolbar.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5739a592d67dbd23a8e3c900c1fcad362
SHA17f163d8d479d43ba2ca3255ed01c916ec6dbab28
SHA25603eab68a5b65e95ed3043b76b3610406d9010d270ed729916fed1d5b89acf248
SHA5128f8eb034ce1bcdb9ab98cb436846be99d4f47ccfdc5605b341d88e48bb56f674fe27bb4387b84b2180ca504cb2aeb2310f17c0ccc86c556cc701eae1b918afe9
-
Filesize
161KB
MD58c97d8bb1470c6498e47b12c5a03ce39
SHA115d233b22f1c3d756dca29bcc0021e6fb0b8cdf7
SHA256a87f19f9fee475d2b2e82acfb4589be6d816b613064cd06826e1d4c147beb50a
SHA5127ad0b2b0319da52152c2595ee45045d0c06b157cdaaa56ad57dde9736be3e45fd7357949126f80d3e72b21510f9bf69d010d51b3967a7644662808beed067c3f
-
Filesize
10KB
MD53b2e23d259394c701050486e642d14fa
SHA14e9661c4ba84400146b80b905f46a0f7ef4d62eb
SHA256166d7156142f3ee09fa69eb617dd22e4fd248aa80a1ac08767db6ad99a2705c1
SHA5122b792296dffa4e43bc85295dc7691bd29762ce5d9d5eafaa74e199e6a8e5b24aa85d0a1b27776d4719a49b0d29abcf6f240746a209528e608b596b560e5a3b88