Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe
-
Size
224KB
-
MD5
f01b504ee60ccee7e7c2332ea904a23c
-
SHA1
90f9d3ed96c2afcee6eee8a90f31f15b6ce04abe
-
SHA256
77f1845b8f1d0a95c1cace6f09259bcc4372d862a58e0c68ff6e86a1895fe529
-
SHA512
a6e065cefeb2e5e7b3742c0602d51761cc566ebec22db8aed44400e606990d5e40f5a03c0474ca0ba0819f40133638c51a9f63e1f1fed3c8b857191a52feac32
-
SSDEEP
3072:tc2ExEMEoAoAKAXA6A3A+AfAzA2AfAbeo4U41414j414t454/414H41414141411:u
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" peeihed.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\Control Panel\International\Geo\Nation f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4148 peeihed.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /f" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /K" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /G" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /O" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /l" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /e" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /Q" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /a" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /R" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /A" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /k" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /Y" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /Z" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /B" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /X" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /M" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /c" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /w" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /N" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /F" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /o" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /i" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /p" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /E" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /u" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /g" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /D" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /n" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /U" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /H" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /L" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /d" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /V" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /v" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /T" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /W" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /P" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /r" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /h" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /j" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /z" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /y" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /J" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /I" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /x" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /q" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /S" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /C" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /s" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /m" peeihed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peeihed = "C:\\Users\\Admin\\peeihed.exe /t" peeihed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe 4148 peeihed.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1596 f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe 4148 peeihed.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1596 wrote to memory of 4148 1596 f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe 90 PID 1596 wrote to memory of 4148 1596 f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe 90 PID 1596 wrote to memory of 4148 1596 f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe 90 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83 PID 4148 wrote to memory of 1596 4148 peeihed.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\peeihed.exe"C:\Users\Admin\peeihed.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5d55ba4259d1519809741b3e78d383a00
SHA11cbf93b86f44a91e0e639e54211b800ae5dffb6d
SHA256ebf268aa31d681aa54d3fc2cd79ed7f9e83fa61ae941c4cd956c5f73707edf21
SHA512329e803b5c7cd2ef640ddc19730629847a00f5e89926645e37ccb65e9861e3b9d8dda49aa4f619c3eef855fb43eb8ac08fb1053279ea525d7c479bda6aa53632