Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe
-
Size
300KB
-
MD5
ed590695c86d36428567cf0a5ba082cf
-
SHA1
439258cf1ccae0fb622bb8a67fd75a85afe43e76
-
SHA256
5bb615a671d9fd3f0e32526f18c402394134c8c4ec0c4a79fcd422b6f43943c5
-
SHA512
813a55e71e59a0d8c1a703887030dd38e281a652bb0871096618021f531058a85aa3b9c23e1437503fbe82271978bd7769d0afcc30061511bf36860b33e2a44a
-
SSDEEP
3072:khEPZz2c1VzH9ZtyYjBCwD+afFICNcFOnQYPDY0rlGY4aDACauXHt7kMMor5cu:WEPZz
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" deuik.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 208 deuik.exe -
Adds Run key to start application 2 TTPs 50 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /q" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /N" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /I" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /m" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /z" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /i" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /x" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /B" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /y" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /X" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /v" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /P" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /K" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /Z" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /E" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /r" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /H" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /U" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /n" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /s" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /S" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /w" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /Y" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /g" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /c" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /V" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /Q" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /M" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /J" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /o" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /p" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /j" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /f" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /L" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /k" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /u" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /R" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /G" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /d" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /T" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /a" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /h" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /b" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /t" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /l" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /A" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /C" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /F" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /e" deuik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deuik = "C:\\Users\\Admin\\deuik.exe /O" deuik.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe 208 deuik.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4968 ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe 208 deuik.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4968 wrote to memory of 208 4968 ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe 90 PID 4968 wrote to memory of 208 4968 ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe 90 PID 4968 wrote to memory of 208 4968 ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe 90 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89 PID 208 wrote to memory of 4968 208 deuik.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed590695c86d36428567cf0a5ba082cf_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\deuik.exe"C:\Users\Admin\deuik.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4088 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:1508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD5f0f7253323c293b2db7465d1ffd31e90
SHA1d80e45739e29d041a94bfff7518d822835223539
SHA256acb37a3f8148e62cacb37cf24b1ff0a1728e4f5866dc8571f1cd7941e7d86dd2
SHA512f159d46022202dd8da2b496812336580c6e40fb8b9febe1034808fb316c5bff389839334685f4bb14ea3e209bb9247f076d5cd6c4692e675b2e9d437de0b5543