Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
30f562ef020...18.exe
windows7-x64
70f562ef020...18.exe
windows10-2004-x64
7$APPDATA/�...÷.lnk
windows7-x64
3$APPDATA/�...÷.lnk
windows10-2004-x64
7$FAVORITES...÷.url
windows7-x64
6$FAVORITES...÷.url
windows10-2004-x64
3$FAVORITES...÷.url
windows7-x64
6$FAVORITES...÷.url
windows10-2004-x64
3$FAVORITES...Ø.url
windows7-x64
6$FAVORITES...Ø.url
windows10-2004-x64
3$FAVORITES...½.url
windows7-x64
6$FAVORITES...½.url
windows10-2004-x64
3$TEMP/A±�...HJ.dll
windows7-x64
1$TEMP/A±�...HJ.dll
windows10-2004-x64
1$TEMP/A±�...Io.dll
windows7-x64
1$TEMP/A±�...Io.dll
windows10-2004-x64
1$TEMP/A±�...Io.sys
windows7-x64
1$TEMP/A±�...Io.sys
windows10-2004-x64
1$TEMP/A±�...er.exe
windows7-x64
1$TEMP/A±�...er.exe
windows10-2004-x64
1$TEMP/A±�...ll.exe
windows7-x64
7$TEMP/A±�...ll.exe
windows10-2004-x64
7C:/Documen...��.lnk
windows7-x64
1C:/Documen...��.lnk
windows10-2004-x64
1C:/Documen...÷.url
windows7-x64
1C:/Documen...÷.url
windows10-2004-x64
1C:/Documen...÷.url
windows7-x64
1C:/Documen...÷.url
windows10-2004-x64
1C:/Documen...Ø.url
windows7-x64
1C:/Documen...Ø.url
windows10-2004-x64
1C:/Documen...½.url
windows7-x64
1C:/Documen...½.url
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 19:57
Static task
static1
Behavioral task
behavioral1
Sample
0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$APPDATA/Æô¶¯ Internet Explorer ä¯ÀÀÆ÷.lnk
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$APPDATA/Æô¶¯ Internet Explorer ä¯ÀÀÆ÷.lnk
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$FAVORITES/GoogleËÑË÷.url
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$FAVORITES/GoogleËÑË÷.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$FAVORITES/°Ù¶ÈËÑË÷.url
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$FAVORITES/°Ù¶ÈËÑË÷.url
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
$FAVORITES/ÍêÃÀϵͳÏÂÔØ.url
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
$FAVORITES/ÍêÃÀϵͳÏÂÔØ.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$FAVORITES/ÍøÖ·µ¼º½.url
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
$FAVORITES/ÍøÖ·µ¼º½.url
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
$TEMP/A±äËÙÆ÷/JSHJ.dll
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
$TEMP/A±äËÙÆ÷/JSHJ.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
$TEMP/A±äËÙÆ÷/WinIo.dll
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
$TEMP/A±äËÙÆ÷/WinIo.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$TEMP/A±äËÙÆ÷/WinIo.sys
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$TEMP/A±äËÙÆ÷/WinIo.sys
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$TEMP/A±äËÙÆ÷/aspeeder.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
$TEMP/A±äËÙÆ÷/aspeeder.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$TEMP/A±äËÙÆ÷/uninstall.exe
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
$TEMP/A±äËÙÆ÷/uninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
C:/Documents and Settings/Default User/Application Data/Microsoft/Internet Explorer/Quick Launch/�.lnk
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
C:/Documents and Settings/Default User/Application Data/Microsoft/Internet Explorer/Quick Launch/�.lnk
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
C:/Documents and Settings/Default User/Favorites/GoogleËÑË÷.url
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
C:/Documents and Settings/Default User/Favorites/GoogleËÑË÷.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
C:/Documents and Settings/Default User/Favorites/°Ù¶ÈËÑË÷.url
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
C:/Documents and Settings/Default User/Favorites/°Ù¶ÈËÑË÷.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
C:/Documents and Settings/Default User/Favorites/ÍêÃÀϵͳÏÂÔØ.url
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
C:/Documents and Settings/Default User/Favorites/ÍêÃÀϵͳÏÂÔØ.url
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
C:/Documents and Settings/Default User/Favorites/ÍøÖ·µ¼º½.url
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
C:/Documents and Settings/Default User/Favorites/ÍøÖ·µ¼º½.url
Resource
win10v2004-20240611-en
General
-
Target
$FAVORITES/GoogleËÑË÷.url
-
Size
74B
-
MD5
8be576f4a76d79e98ecc7e61b2beaf12
-
SHA1
0589dbef82d50f5c0ff3baa0e216faf3c1a26168
-
SHA256
5dbb2a3396574347dd5e1c231a8e1dd49faefa094e7358a29eddce2f16406584
-
SHA512
46b0ab0e746b74b8bae881df06514999be3aa39f7a697c390a4dd37bdaf5e874069e585245e95eec5b39878aa465ab41ca886afce85b8dfbd6904ed01a9fc74c
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000006626d3d54b587623196930febac478efeac1e7003c7c64ec24fe0e1e3359c492000000000e8000000002000020000000bd3198ecc41f467e17e6b35ed8a7c436d50bc1a5d6002f126b0d43e6d841e5e7200000001413e7c696a94cf5224165f513f932c7b06f797179bfbce16c99ae91e13f4b5640000000548a032497ef86c39a9beff72cec972291359af3ceec4aa27b67959832a143be7666f2577e6e0acbac603144ce36e38d37c80f1537afa4de54c65225c0b99f8a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606e60163ac7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425507355" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{30A94FD1-332D-11EF-BD9C-4E559C6B32B6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1728 2068 iexplore.exe 30 PID 2068 wrote to memory of 1728 2068 iexplore.exe 30 PID 2068 wrote to memory of 1728 2068 iexplore.exe 30 PID 2068 wrote to memory of 1728 2068 iexplore.exe 30
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\$FAVORITES\GoogleËÑË÷.url1⤵
- Checks whether UAC is enabled
PID:2900
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1728
-