Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
34637b45816...18.exe
windows7-x64
74637b45816...18.exe
windows10-2004-x64
7$PLUGINSDI...am.dll
windows7-x64
3$PLUGINSDI...am.dll
windows10-2004-x64
3$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...fc.dll
windows7-x64
3$PLUGINSDI...fc.dll
windows10-2004-x64
3Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2024, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DLLWaitForKillProgram.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DLLWaitForKillProgram.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/IEKill.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/IEKill.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/ShowAddressMfc.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/ShowAddressMfc.dll
Resource
win10v2004-20241007-en
General
-
Target
4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe
-
Size
115KB
-
MD5
4637b458169f1a616b39dbd69be2c588
-
SHA1
fd8e3085fa61867d9ab71dec5772eb3b1bb4022a
-
SHA256
a8726e2dca08427204b95ce057baeee7959482719223d4f457088d3f9249c6d8
-
SHA512
15b8f8f350de5985798f7adf4b28026e0dd3e19028ea76c8ab5ada55ec46a8bd9f1ae3c2cb973accb8411c862b4848df6da4a1d05b2b753670b7525116de0f5f
-
SSDEEP
3072:SXu/MVID9mJ0oV2vDVylswCRWBifUQsNzQEnvs4M4:SjCQ2vRylqRuiNsNdnvs4t
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4776 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 4776 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023b8e-3.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2276 wrote to memory of 4776 2276 4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe 84 PID 2276 wrote to memory of 4776 2276 4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe 84 PID 2276 wrote to memory of 4776 2276 4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD507f3b3445f66e1089567796bf3c8be78
SHA1851eb574c1067b23a654f8aa47b17ef599b24d1c
SHA256a505e6c537a5ce0166227dda9f7671605395592ac9f1a3764e8a01b713939db1
SHA5128c56308fff3a947b26fd0d98dbdd96c406ddf967f5d7abee8cba082b6c46a4e575094bb0bb981551ac5160bb5089cf6fb125dd17a659c427e28c07402adab1c3
-
Filesize
586B
MD5278ad09c4e58fe833eac2ff9e096526f
SHA1635bcab4585606945dfc5e30115ddb820d4d39c4
SHA256e4d8b0bdf71e7d739d222cd672c4b9fcc9c69d320d14bea250d8232b0aa7f879
SHA512f7fb08f700176a50f258610ce83f10ae41649e0781f4085bb97aa47fafc5225e4e097e8bf3e55512e150eb067c15f8a01c1b924d4cd87f6bb62b57847433ce50
-
Filesize
115KB
MD54637b458169f1a616b39dbd69be2c588
SHA1fd8e3085fa61867d9ab71dec5772eb3b1bb4022a
SHA256a8726e2dca08427204b95ce057baeee7959482719223d4f457088d3f9249c6d8
SHA51215b8f8f350de5985798f7adf4b28026e0dd3e19028ea76c8ab5ada55ec46a8bd9f1ae3c2cb973accb8411c862b4848df6da4a1d05b2b753670b7525116de0f5f