Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 11:15
Static task
static1
Behavioral task
behavioral1
Sample
209efe65db32679b693b168ccd51a4bc_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
209efe65db32679b693b168ccd51a4bc_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
209efe65db32679b693b168ccd51a4bc_JaffaCakes118.exe
-
Size
111KB
-
MD5
209efe65db32679b693b168ccd51a4bc
-
SHA1
ca430a22a4155af68beb148fd34032c759326edc
-
SHA256
b3652318b4839285a244c3cce72ae98597ff6287e9247f5365587981e3067b6e
-
SHA512
666b0b7bdf20a37779e37fa3601b19139cc014809094101ca1edc2158016b6dfc567b9625638ed5890efcc4835563ee93ac83040ab49e003fbd5e5e140bce5d8
-
SSDEEP
1536:uP1JI4t8qDwTvD+bFWU+L1i4QmOexXxBxmxZx44D4dMz4n4N4t4R4R7ILiJIIIIN:c1JI4K3p4D4dMz4n4N4t4R4aEIIIIz5
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" guasaa.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation 209efe65db32679b693b168ccd51a4bc_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3748 guasaa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guasaa = "C:\\Users\\Admin\\guasaa.exe" guasaa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe 3748 guasaa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3612 209efe65db32679b693b168ccd51a4bc_JaffaCakes118.exe 3748 guasaa.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3612 wrote to memory of 3748 3612 209efe65db32679b693b168ccd51a4bc_JaffaCakes118.exe 89 PID 3612 wrote to memory of 3748 3612 209efe65db32679b693b168ccd51a4bc_JaffaCakes118.exe 89 PID 3612 wrote to memory of 3748 3612 209efe65db32679b693b168ccd51a4bc_JaffaCakes118.exe 89 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84 PID 3748 wrote to memory of 3612 3748 guasaa.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\209efe65db32679b693b168ccd51a4bc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\209efe65db32679b693b168ccd51a4bc_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\guasaa.exe"C:\Users\Admin\guasaa.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD56c0392f533ed7c25b1e51d2b4e899be1
SHA1d4c4648b2bd055d4771486e9f77d56252b6da74f
SHA256b83299ae770d02128220805a287ea6f277138d4b70837504b62db32850abb2d7
SHA512d6bcc11db03eee3c96142a5a23bf69da038be4556c9c4f9ca654356d7ba19d2168c200f1ae6fd3931beffc6bdbc616e1a1c7da2eae1ed0ad2bd86d1bc4d656a3