Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
30f562ef020...18.exe
windows7-x64
70f562ef020...18.exe
windows10-2004-x64
7$APPDATA/�...÷.lnk
windows7-x64
3$APPDATA/�...÷.lnk
windows10-2004-x64
7$FAVORITES...÷.url
windows7-x64
6$FAVORITES...÷.url
windows10-2004-x64
3$FAVORITES...÷.url
windows7-x64
6$FAVORITES...÷.url
windows10-2004-x64
3$FAVORITES...Ø.url
windows7-x64
6$FAVORITES...Ø.url
windows10-2004-x64
3$FAVORITES...½.url
windows7-x64
6$FAVORITES...½.url
windows10-2004-x64
3$TEMP/A±�...HJ.dll
windows7-x64
1$TEMP/A±�...HJ.dll
windows10-2004-x64
1$TEMP/A±�...Io.dll
windows7-x64
1$TEMP/A±�...Io.dll
windows10-2004-x64
1$TEMP/A±�...Io.sys
windows7-x64
1$TEMP/A±�...Io.sys
windows10-2004-x64
1$TEMP/A±�...er.exe
windows7-x64
1$TEMP/A±�...er.exe
windows10-2004-x64
1$TEMP/A±�...ll.exe
windows7-x64
7$TEMP/A±�...ll.exe
windows10-2004-x64
7C:/Documen...��.lnk
windows7-x64
1C:/Documen...��.lnk
windows10-2004-x64
1C:/Documen...÷.url
windows7-x64
1C:/Documen...÷.url
windows10-2004-x64
1C:/Documen...÷.url
windows7-x64
1C:/Documen...÷.url
windows10-2004-x64
1C:/Documen...Ø.url
windows7-x64
1C:/Documen...Ø.url
windows10-2004-x64
1C:/Documen...½.url
windows7-x64
1C:/Documen...½.url
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 19:57
Static task
static1
Behavioral task
behavioral1
Sample
0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$APPDATA/Æô¶¯ Internet Explorer ä¯ÀÀÆ÷.lnk
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$APPDATA/Æô¶¯ Internet Explorer ä¯ÀÀÆ÷.lnk
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$FAVORITES/GoogleËÑË÷.url
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$FAVORITES/GoogleËÑË÷.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$FAVORITES/°Ù¶ÈËÑË÷.url
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$FAVORITES/°Ù¶ÈËÑË÷.url
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
$FAVORITES/ÍêÃÀϵͳÏÂÔØ.url
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
$FAVORITES/ÍêÃÀϵͳÏÂÔØ.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$FAVORITES/ÍøÖ·µ¼º½.url
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
$FAVORITES/ÍøÖ·µ¼º½.url
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
$TEMP/A±äËÙÆ÷/JSHJ.dll
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
$TEMP/A±äËÙÆ÷/JSHJ.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
$TEMP/A±äËÙÆ÷/WinIo.dll
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
$TEMP/A±äËÙÆ÷/WinIo.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$TEMP/A±äËÙÆ÷/WinIo.sys
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$TEMP/A±äËÙÆ÷/WinIo.sys
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$TEMP/A±äËÙÆ÷/aspeeder.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
$TEMP/A±äËÙÆ÷/aspeeder.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$TEMP/A±äËÙÆ÷/uninstall.exe
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
$TEMP/A±äËÙÆ÷/uninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
C:/Documents and Settings/Default User/Application Data/Microsoft/Internet Explorer/Quick Launch/�.lnk
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
C:/Documents and Settings/Default User/Application Data/Microsoft/Internet Explorer/Quick Launch/�.lnk
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
C:/Documents and Settings/Default User/Favorites/GoogleËÑË÷.url
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
C:/Documents and Settings/Default User/Favorites/GoogleËÑË÷.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
C:/Documents and Settings/Default User/Favorites/°Ù¶ÈËÑË÷.url
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
C:/Documents and Settings/Default User/Favorites/°Ù¶ÈËÑË÷.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
C:/Documents and Settings/Default User/Favorites/ÍêÃÀϵͳÏÂÔØ.url
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
C:/Documents and Settings/Default User/Favorites/ÍêÃÀϵͳÏÂÔØ.url
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
C:/Documents and Settings/Default User/Favorites/ÍøÖ·µ¼º½.url
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
C:/Documents and Settings/Default User/Favorites/ÍøÖ·µ¼º½.url
Resource
win10v2004-20240611-en
General
-
Target
$TEMP/A±äËÙÆ÷/uninstall.exe
-
Size
35KB
-
MD5
df01d76736107080fb48dd38bf110f0c
-
SHA1
1a51f3988cf4c60010ea8b0d9cf45d0427f3df38
-
SHA256
9dc0ad7de80ca7f5a61baa95eec4724104a9d20d12d36aa606406c90c50541c9
-
SHA512
284a30d831a59f505f28199182d514eac79f757b68defd249a90ee964a85b189cd2777c004d642303d7ed948caa3ebeed84b51c3a99f43286d1143b2a810ab23
-
SSDEEP
768:xE+BmrtvkC3kCERF57oTBQsuE2Ol3E3VLhg0rJsJRnmg:xZBCOCsoGXcERrJhg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1092 A~NSISu_.exe -
Loads dropped DLL 4 IoCs
pid Process 1452 uninstall.exe 1092 A~NSISu_.exe 1092 A~NSISu_.exe 1092 A~NSISu_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1092 A~NSISu_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1452 wrote to memory of 1092 1452 uninstall.exe 28 PID 1452 wrote to memory of 1092 1452 uninstall.exe 28 PID 1452 wrote to memory of 1092 1452 uninstall.exe 28 PID 1452 wrote to memory of 1092 1452 uninstall.exe 28 PID 1452 wrote to memory of 1092 1452 uninstall.exe 28 PID 1452 wrote to memory of 1092 1452 uninstall.exe 28 PID 1452 wrote to memory of 1092 1452 uninstall.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\A±äËÙÆ÷\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\A±äËÙÆ÷\uninstall.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe"C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe" _?=C:\Users\Admin\AppData\Local\Temp\$TEMP\A±äËÙÆ÷2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1092
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5df01d76736107080fb48dd38bf110f0c
SHA11a51f3988cf4c60010ea8b0d9cf45d0427f3df38
SHA2569dc0ad7de80ca7f5a61baa95eec4724104a9d20d12d36aa606406c90c50541c9
SHA512284a30d831a59f505f28199182d514eac79f757b68defd249a90ee964a85b189cd2777c004d642303d7ed948caa3ebeed84b51c3a99f43286d1143b2a810ab23