Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3302f65d666...18.exe
windows7-x64
7302f65d666...18.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDIR/Inetc.dll
windows7-x64
3$PLUGINSDIR/Inetc.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3play.exe
windows7-x64
3play.exe
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
302f65d666bfe79b015f45ee20c14128_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
302f65d666bfe79b015f45ee20c14128_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Inetc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
play.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
play.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
uninst.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
uninst.exe
-
Size
331KB
-
MD5
0778f66f3f44bd46a06190f9ef6ce1fd
-
SHA1
b9e70388f2a25192575da94b8ed1ccbe25e103e9
-
SHA256
47ceb78f7f36aa428987ab001446ea738283570936624b6a935e049b4224bbf4
-
SHA512
d5901d958957e68664427944166670a5969073aef60a1ee9547cd4721ba21e8050ac08a417d6e78d6afcca9bd69f41fdee592801f4845706324c7a41ccd8801d
-
SSDEEP
3072:TqBFJLzgOJJHwEn4JuFsQOe5zlll+lllSllllllllllallll5llll/lllllllllk:+PdZzhsuNovfvFoEtRIuE7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2856 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2856 Au_.exe -
Loads dropped DLL 41 IoCs
pid Process 2720 uninst.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral15/files/0x0005000000019fb9-2.dat nsis_installer_1 behavioral15/files/0x0005000000019fb9-2.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe 2856 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2856 2720 uninst.exe 30 PID 2720 wrote to memory of 2856 2720 uninst.exe 30 PID 2720 wrote to memory of 2856 2720 uninst.exe 30 PID 2720 wrote to memory of 2856 2720 uninst.exe 30 PID 2720 wrote to memory of 2856 2720 uninst.exe 30 PID 2720 wrote to memory of 2856 2720 uninst.exe 30 PID 2720 wrote to memory of 2856 2720 uninst.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58614c450637267afacad1645e23ba24a
SHA1e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2
SHA2560fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758
SHA512af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b
-
Filesize
14KB
MD5254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
Filesize
331KB
MD50778f66f3f44bd46a06190f9ef6ce1fd
SHA1b9e70388f2a25192575da94b8ed1ccbe25e103e9
SHA25647ceb78f7f36aa428987ab001446ea738283570936624b6a935e049b4224bbf4
SHA512d5901d958957e68664427944166670a5969073aef60a1ee9547cd4721ba21e8050ac08a417d6e78d6afcca9bd69f41fdee592801f4845706324c7a41ccd8801d