Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe
-
Size
300KB
-
MD5
ed590695c86d36428567cf0a5ba082cf
-
SHA1
439258cf1ccae0fb622bb8a67fd75a85afe43e76
-
SHA256
5bb615a671d9fd3f0e32526f18c402394134c8c4ec0c4a79fcd422b6f43943c5
-
SHA512
813a55e71e59a0d8c1a703887030dd38e281a652bb0871096618021f531058a85aa3b9c23e1437503fbe82271978bd7769d0afcc30061511bf36860b33e2a44a
-
SSDEEP
3072:khEPZz2c1VzH9ZtyYjBCwD+afFICNcFOnQYPDY0rlGY4aDACauXHt7kMMor5cu:WEPZz
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cauaka.exe -
Executes dropped EXE 1 IoCs
pid Process 2520 cauaka.exe -
Loads dropped DLL 2 IoCs
pid Process 2836 ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe 2836 ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /s" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /V" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /L" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /O" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /k" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /C" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /x" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /h" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /J" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /v" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /o" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /t" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /g" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /D" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /H" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /K" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /b" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /r" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /T" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /W" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /A" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /U" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /l" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /Z" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /F" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /Q" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /w" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /m" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /d" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /n" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /u" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /S" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /c" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /Y" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /f" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /q" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /M" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /B" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /y" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /X" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /I" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /j" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /R" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /P" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /e" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /a" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /E" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /N" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /z" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /G" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /p" cauaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauaka = "C:\\Users\\Admin\\cauaka.exe /i" cauaka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe 2520 cauaka.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2836 ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe 2520 cauaka.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2520 2836 ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe 28 PID 2836 wrote to memory of 2520 2836 ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe 28 PID 2836 wrote to memory of 2520 2836 ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe 28 PID 2836 wrote to memory of 2520 2836 ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe 28 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27 PID 2520 wrote to memory of 2836 2520 cauaka.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\cauaka.exe"C:\Users\Admin\cauaka.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD5cd70d48087194c01366f0269a372a9af
SHA1f700db7cfeaf85b82494cb9d3fced6c469a1485d
SHA2564b795e56507b1f8457a1dfab3d7181ab56841c9d164972e31f246a19be1543d9
SHA51212887b5575fc23f6d04bfe7001b562514fd6a24fcf383a07377a4cae96fd2b3a74221677de6d514a149fe1bc4ba9b7e694c68f6cd5dfb7a4d28a3b308ccda17f