Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
f420a4fb613b2965b6919646c9d0157f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f420a4fb613b2965b6919646c9d0157f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f420a4fb613b2965b6919646c9d0157f_JaffaCakes118.exe
-
Size
236KB
-
MD5
f420a4fb613b2965b6919646c9d0157f
-
SHA1
ebdbba6e515ab0c2734bec5041430b33d49b4496
-
SHA256
b40e8b28a72b95c301c892aaa65edaf5d5f5b961ad8ce32f912c334a555ecb23
-
SHA512
9b5d947a66cdf4c7048faa7b302a99b4a48c4de3e0762408e811932b5506de9f5d7ef671ea3c061d7da363b4dde216485518b2e025406f066686ce88612b394f
-
SSDEEP
3072:rdNhnA6wKzzGKXW28oYLVp0uP5cPLa6KMWM+x2rfdnpcJMyaegtmN2W6gBV:rtA5mzGXoYZpDPCPLa64fmdK+dt5W
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f420a4fb613b2965b6919646c9d0157f_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" roucud.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Control Panel\International\Geo\Nation f420a4fb613b2965b6919646c9d0157f_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2008 roucud.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /c" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /g" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /v" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /y" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /w" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /k" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /p" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /u" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /l" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /a" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /e" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /d" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /b" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /j" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /n" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /t" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /o" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /m" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /s" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /n" f420a4fb613b2965b6919646c9d0157f_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /q" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /x" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /f" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /r" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /h" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /z" roucud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roucud = "C:\\Users\\Admin\\roucud.exe /i" roucud.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4780 f420a4fb613b2965b6919646c9d0157f_JaffaCakes118.exe 4780 f420a4fb613b2965b6919646c9d0157f_JaffaCakes118.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe 2008 roucud.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4780 f420a4fb613b2965b6919646c9d0157f_JaffaCakes118.exe 2008 roucud.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4780 wrote to memory of 2008 4780 f420a4fb613b2965b6919646c9d0157f_JaffaCakes118.exe 88 PID 4780 wrote to memory of 2008 4780 f420a4fb613b2965b6919646c9d0157f_JaffaCakes118.exe 88 PID 4780 wrote to memory of 2008 4780 f420a4fb613b2965b6919646c9d0157f_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f420a4fb613b2965b6919646c9d0157f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f420a4fb613b2965b6919646c9d0157f_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\roucud.exe"C:\Users\Admin\roucud.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5366575e5ee027bd082bce8a6faea7b0c
SHA16b55ba6637cdfc85fdb177fe85d592fbcb21adcd
SHA256de25c4421fa5bc21fb02be3ff39915eaa2f4863e194fe8116aeff705184734bd
SHA512ce6fa22c72107306dbbed5ca852ffe64f10bca9208b4606ed1e5880f463fa27fc474a24adb9a7dcc320935157753b018fd61911b8707d746911d30e63c48e846