Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
19/06/2024, 20:15
Static task
static1
Behavioral task
behavioral1
Sample
004bb3d7fe606c0395a4498c92b12751_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
004bb3d7fe606c0395a4498c92b12751_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
004bb3d7fe606c0395a4498c92b12751_JaffaCakes118.exe
-
Size
96KB
-
MD5
004bb3d7fe606c0395a4498c92b12751
-
SHA1
4de09ee6b2da80ffa6c976a0e67ad7c31faf7b9a
-
SHA256
031ae0f6a9eddc291de2e093db67a9a51a756f85e39939dc73e85bd33c1b93b1
-
SHA512
5588743285e423537775a87aefea67890c27addd2c5adbb0b8ae56d2ec8a4fa7f0afeb4efbb826b1345c184e0f7ebe2c260ac233d6f1b06eeb9f19307ec254a9
-
SSDEEP
1536:PgvEg52X9tyVQO8P8ychA+wjj3RJNEo/knRzdnynE7RldNEP8lijOezNIjnZ4P:PmE/XelychA3zR3Ek65RldqzCnqP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 004bb3d7fe606c0395a4498c92b12751_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wuvev.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Control Panel\International\Geo\Nation 004bb3d7fe606c0395a4498c92b12751_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3912 wuvev.exe -
Adds Run key to start application 2 TTPs 50 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /T" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /C" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /D" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /v" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /k" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /P" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /L" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /p" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /x" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /f" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /W" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /A" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /R" 004bb3d7fe606c0395a4498c92b12751_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /z" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /G" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /K" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /S" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /m" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /F" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /s" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /U" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /q" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /X" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /y" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /M" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /u" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /n" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /B" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /e" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /t" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /E" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /h" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /g" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /a" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /H" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /b" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /J" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /V" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /Y" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /i" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /I" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /R" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /w" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /Z" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /N" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /d" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /c" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /r" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /O" wuvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuvev = "C:\\Users\\Admin\\wuvev.exe /Q" wuvev.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2460 004bb3d7fe606c0395a4498c92b12751_JaffaCakes118.exe 2460 004bb3d7fe606c0395a4498c92b12751_JaffaCakes118.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe 3912 wuvev.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2460 004bb3d7fe606c0395a4498c92b12751_JaffaCakes118.exe 3912 wuvev.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2460 wrote to memory of 3912 2460 004bb3d7fe606c0395a4498c92b12751_JaffaCakes118.exe 86 PID 2460 wrote to memory of 3912 2460 004bb3d7fe606c0395a4498c92b12751_JaffaCakes118.exe 86 PID 2460 wrote to memory of 3912 2460 004bb3d7fe606c0395a4498c92b12751_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\004bb3d7fe606c0395a4498c92b12751_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\004bb3d7fe606c0395a4498c92b12751_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\wuvev.exe"C:\Users\Admin\wuvev.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD54058842fcd34f6beb96d7422625c01e6
SHA109a121685d378c0fcb8c1fff104debbab1844bc9
SHA2563facd09d29efa98a530c41ea0bc83f93d5eee54746c49022f08e101f58a3acd9
SHA512ee8d25a25c39376303f8f2a4b464afb19c441815f2969ff50771fa9d1f62c611bdc21e538f722f700c29500dcc8a91a84c2e8bf80e6d5f1cbbcbeab052e21d73