Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 02:42
Static task
static1
Behavioral task
behavioral1
Sample
fbc04b72d274ae7cfd3cd69aadf389cf_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fbc04b72d274ae7cfd3cd69aadf389cf_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fbc04b72d274ae7cfd3cd69aadf389cf_JaffaCakes118.exe
-
Size
196KB
-
MD5
fbc04b72d274ae7cfd3cd69aadf389cf
-
SHA1
38f3109a6e1cb16e17b803a729a0d8f5e3e85ca3
-
SHA256
e3cbf30449ff668ab7c9cbef820512132d25c44d8924108fae8c6b1cedc28349
-
SHA512
c69a397d554c7f3f59070bf7c4379f75f8ca0d56c3a23d7bcd71b56e46f7ce59c28b76a55f0703c418f2a71c688032b8f8c58af5448af640dbe4167a334216d7
-
SSDEEP
6144:/WvnELXCb1CcReqYJqOaihDI/5Yz43qA0gA3Zgfx9c1dLJYkAeRBVF48tju1f8Lr:/knEuGhI/5Yz43qA0gA3Zgfx9c1dLJYU
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" roiotu.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation fbc04b72d274ae7cfd3cd69aadf389cf_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2540 roiotu.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /W" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /n" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /B" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /T" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /y" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /m" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /f" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /l" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /p" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /U" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /J" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /H" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /h" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /A" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /j" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /r" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /Z" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /O" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /s" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /L" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /e" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /F" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /i" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /x" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /u" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /v" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /K" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /g" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /t" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /V" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /G" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /b" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /E" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /D" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /M" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /P" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /X" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /R" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /w" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /k" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /a" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /o" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /C" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /N" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /d" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /q" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /I" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /S" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /Q" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /c" roiotu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roiotu = "C:\\Users\\Admin\\roiotu.exe /Y" roiotu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe 2540 roiotu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5064 fbc04b72d274ae7cfd3cd69aadf389cf_JaffaCakes118.exe 2540 roiotu.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5064 wrote to memory of 2540 5064 fbc04b72d274ae7cfd3cd69aadf389cf_JaffaCakes118.exe 91 PID 5064 wrote to memory of 2540 5064 fbc04b72d274ae7cfd3cd69aadf389cf_JaffaCakes118.exe 91 PID 5064 wrote to memory of 2540 5064 fbc04b72d274ae7cfd3cd69aadf389cf_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbc04b72d274ae7cfd3cd69aadf389cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbc04b72d274ae7cfd3cd69aadf389cf_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\roiotu.exe"C:\Users\Admin\roiotu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4292 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:81⤵PID:1420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD58156f3f57256c7ad92e7460a9605ca93
SHA11e8acf226fc5847ee86df5a16483e21496842884
SHA256d2102751cd9dee1bebaa1926f96709130b08f7b398f251f3aae87b36a9e2afd8
SHA5123413f680f50fdbff6bcdddbe11543c664917cea71b0c33a072b30c897e8b82693aa7b3871369f955453076558c27c2a59c2cb25f1e7124538a8a032b2772dc2f