Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10e0215c2225...18.exe
windows7-x64
7e0215c2225...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3Analizador.dll
windows7-x64
3Analizador.dll
windows10-2004-x64
3Ayuda.exe
windows7-x64
5Ayuda.exe
windows10-2004-x64
5E-mail_Marketing.exe
windows7-x64
10E-mail_Marketing.exe
windows10-2004-x64
10Extractor.exe
windows7-x64
1Extractor.exe
windows10-2004-x64
3Seguridad.dll
windows7-x64
3Seguridad.dll
windows10-2004-x64
3Servidor_em.exe
windows7-x64
3Servidor_em.exe
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
92s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2024, 05:48
Behavioral task
behavioral1
Sample
e0215c22250ea3756ed1469479e4fc43_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e0215c22250ea3756ed1469479e4fc43_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Analizador.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
Analizador.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Ayuda.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Ayuda.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
E-mail_Marketing.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
E-mail_Marketing.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Extractor.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
Extractor.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Seguridad.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Seguridad.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Servidor_em.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Servidor_em.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
uninst.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
uninst.exe
Resource
win10v2004-20241007-en
General
-
Target
uninst.exe
-
Size
33KB
-
MD5
8a85e3d6517152a8ddaac8c547f942d8
-
SHA1
9414ffdd847ad89076bc2b6807540bc0f2c85791
-
SHA256
93e1d700f16cba773ff18810ff0bb1b488a93fd18c0f5f90013b5448ca624fb3
-
SHA512
435912030953e06118bdf6b717de99d7982d0e890aa328312c6b9c20e0262c5433cac5ca6e91c1b9b36879df0efc760c98a24d3dadb900b4b744771f3eaf673a
-
SSDEEP
768:TXKsDnvuB3hRx867tuXLx5Ro2NP0u6X71F38s1mJlEj:LKsTvudhg67q1mX7BmJlEj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2716 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2716 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral18/files/0x0007000000023cdb-3.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3480 wrote to memory of 2716 3480 uninst.exe 82 PID 3480 wrote to memory of 2716 3480 uninst.exe 82 PID 3480 wrote to memory of 2716 3480 uninst.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD58a85e3d6517152a8ddaac8c547f942d8
SHA19414ffdd847ad89076bc2b6807540bc0f2c85791
SHA25693e1d700f16cba773ff18810ff0bb1b488a93fd18c0f5f90013b5448ca624fb3
SHA512435912030953e06118bdf6b717de99d7982d0e890aa328312c6b9c20e0262c5433cac5ca6e91c1b9b36879df0efc760c98a24d3dadb900b4b744771f3eaf673a