Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3025642e318...18.exe
windows7-x64
7025642e318...18.exe
windows10-2004-x64
7$PLUGINSDI...RL.dll
windows7-x64
3$PLUGINSDI...RL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$SMPROGRAM...Ø.lnk
windows7-x64
3$SMPROGRAM...Ø.lnk
windows10-2004-x64
3Data/GUI/s...til.js
windows7-x64
3Data/GUI/s...til.js
windows10-2004-x64
3Eets.exe
windows7-x64
1Eets.exe
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7ÐÂÔÆÈ...Ø.lnk
windows7-x64
3ÐÂÔÆÈ...Ø.lnk
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
025642e3182bccbc79d71be8a7e45d8a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
025642e3182bccbc79d71be8a7e45d8a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$SMPROGRAMS/ÒÁÌØ/ÐÂÔÆÈí¼þÏÂÔØ.lnk
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$SMPROGRAMS/ÒÁÌØ/ÐÂÔÆÈí¼þÏÂÔØ.lnk
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Data/GUI/screenutil.js
Resource
win7-20240419-en
Behavioral task
behavioral10
Sample
Data/GUI/screenutil.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Eets.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Eets.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
uninst.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uninst.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
ÐÂÔÆÈí¼þÏÂÔØ.lnk
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
ÐÂÔÆÈí¼þÏÂÔØ.lnk
Resource
win10v2004-20240611-en
General
-
Target
uninst.exe
-
Size
67KB
-
MD5
33b80fbfd65984a74d29ad185b4a8481
-
SHA1
26b55f36e0ed2f1c1c970435ad54660106938220
-
SHA256
fbe5bf79539127476c8e624605c61964a7b03d1995cce950d0e34fff4acce6c0
-
SHA512
67821a4cafc22d0baec189b64ffe9aa069e120188242bd92c7c4326de8f7ffb4de03e1acd761cf2e9fd0ef26587f1e5aca80c621ba1ce4cabcd66eef70e696e8
-
SSDEEP
1536:shq3+uta99Hj25XvwLXJLilYRN6QcIwmHX:+stajHKBvYXJLYqTHX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1952 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 3068 uninst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral13/files/0x0003000000021246-2.dat nsis_installer_1 behavioral13/files/0x0003000000021246-2.dat nsis_installer_2 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{47ED4B21-2EB3-11EF-99EB-F2F7F00EEB0D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000f6d8ac3f3c47c937262f09a72f521b0217b2385edade3075c37d036f90d1e5c3000000000e8000000002000020000000f5ac4ddea7c0f6d6c1cdb8f5ba164e997df75cab5f33b8bb20bbb6c2b92648ce20000000ad3052b5921d8a0ed9b505d591ae4c5e435e59c283bc7dec74ac4989cdbf2e754000000093560ef92f92cdc6d11425cbb42b5d21fac09207a9966c8471b377fefa97d107ab90de85f1f0ab6d2983d52b85a55c6d78c3b000dc2b6720198ce61d9d66e537 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d011962dc0c2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425015191" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2284 iexplore.exe 2284 iexplore.exe 1580 IEXPLORE.EXE 1580 IEXPLORE.EXE 1580 IEXPLORE.EXE 1580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1952 3068 uninst.exe 28 PID 3068 wrote to memory of 1952 3068 uninst.exe 28 PID 3068 wrote to memory of 1952 3068 uninst.exe 28 PID 3068 wrote to memory of 1952 3068 uninst.exe 28 PID 1952 wrote to memory of 2284 1952 Au_.exe 29 PID 1952 wrote to memory of 2284 1952 Au_.exe 29 PID 1952 wrote to memory of 2284 1952 Au_.exe 29 PID 1952 wrote to memory of 2284 1952 Au_.exe 29 PID 2284 wrote to memory of 1580 2284 iexplore.exe 31 PID 2284 wrote to memory of 1580 2284 iexplore.exe 31 PID 2284 wrote to memory of 1580 2284 iexplore.exe 31 PID 2284 wrote to memory of 1580 2284 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.newasp.net/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1580
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD533b80fbfd65984a74d29ad185b4a8481
SHA126b55f36e0ed2f1c1c970435ad54660106938220
SHA256fbe5bf79539127476c8e624605c61964a7b03d1995cce950d0e34fff4acce6c0
SHA51267821a4cafc22d0baec189b64ffe9aa069e120188242bd92c7c4326de8f7ffb4de03e1acd761cf2e9fd0ef26587f1e5aca80c621ba1ce4cabcd66eef70e696e8