Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 11:10
Static task
static1
Behavioral task
behavioral1
Sample
571d5c4b38305641cacafc463d6f9cef_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
571d5c4b38305641cacafc463d6f9cef_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$TEMP/MpegBuster.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$TEMP/MpegBuster.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Uninstall.exe
Resource
win10v2004-20241007-en
General
-
Target
Uninstall.exe
-
Size
60KB
-
MD5
6f5da74f61b6a47926343eb9910acc44
-
SHA1
dcd5491faa78fa2b8000dca4406616dabbe95e49
-
SHA256
68c52474873609f2f75c0bb9bbd0c46de026cd40fc19f44865acf1e9976282f3
-
SHA512
8709acdbc39ad0657650246a38940925288658e44ea45eec4a354a8f58cd6aa371e270055f5bb5df1720c09ed110f8e4cc7a9662ca566405726acae6b9e711a2
-
SSDEEP
1536:lFYSF3bc72R2WbtjZTovF/AvSw6R0BJW4:lPg729btBovpvw6R0D
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4624 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 4624 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral6/files/0x000a000000023b94-4.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2248 wrote to memory of 4624 2248 Uninstall.exe 84 PID 2248 wrote to memory of 4624 2248 Uninstall.exe 84 PID 2248 wrote to memory of 4624 2248 Uninstall.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD56f5da74f61b6a47926343eb9910acc44
SHA1dcd5491faa78fa2b8000dca4406616dabbe95e49
SHA25668c52474873609f2f75c0bb9bbd0c46de026cd40fc19f44865acf1e9976282f3
SHA5128709acdbc39ad0657650246a38940925288658e44ea45eec4a354a8f58cd6aa371e270055f5bb5df1720c09ed110f8e4cc7a9662ca566405726acae6b9e711a2