Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
02c1801d3573aa42cdde6c621b111dd0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02c1801d3573aa42cdde6c621b111dd0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
02c1801d3573aa42cdde6c621b111dd0_JaffaCakes118.exe
-
Size
240KB
-
MD5
02c1801d3573aa42cdde6c621b111dd0
-
SHA1
5d6e2d06838eb6a07c21bcb0a1c2f1830f08e2a7
-
SHA256
249aa019fb5dd87699d3d291012d52270a64c4d78f360c7f6deb976a0438d4a3
-
SHA512
afec8b6b5c377bbc358cabcd6838145cbb3866046b389345d86bd6802d620b59bb5ccb5b8f675f98c153362ca41a7895815260ad78806eeeb6a873e5b521ca45
-
SSDEEP
6144:pUjW3dwqsNwemAB0EqxF6snji81RUinKchhy+S3R:LdQQJsZh
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 02c1801d3573aa42cdde6c621b111dd0_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gfseor.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 02c1801d3573aa42cdde6c621b111dd0_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1632 gfseor.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /e" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /b" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /y" 02c1801d3573aa42cdde6c621b111dd0_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /n" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /d" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /v" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /o" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /l" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /a" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /z" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /r" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /y" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /g" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /u" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /i" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /p" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /s" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /m" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /h" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /w" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /t" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /f" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /j" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /k" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /c" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /x" gfseor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gfseor = "C:\\Users\\Admin\\gfseor.exe /q" gfseor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1544 02c1801d3573aa42cdde6c621b111dd0_JaffaCakes118.exe 1544 02c1801d3573aa42cdde6c621b111dd0_JaffaCakes118.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe 1632 gfseor.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1544 02c1801d3573aa42cdde6c621b111dd0_JaffaCakes118.exe 1632 gfseor.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1544 wrote to memory of 1632 1544 02c1801d3573aa42cdde6c621b111dd0_JaffaCakes118.exe 85 PID 1544 wrote to memory of 1632 1544 02c1801d3573aa42cdde6c621b111dd0_JaffaCakes118.exe 85 PID 1544 wrote to memory of 1632 1544 02c1801d3573aa42cdde6c621b111dd0_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\02c1801d3573aa42cdde6c621b111dd0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\02c1801d3573aa42cdde6c621b111dd0_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\gfseor.exe"C:\Users\Admin\gfseor.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5b5818cfbd8e8cc56328f2c295601ca81
SHA16d3075ae49d7efce5195648fe6c13cf5b5dafcfa
SHA25694444103a577f5586cb52046411cd3ab5eab022c373080aa4057e7eb87b2430c
SHA512db717e66ece71f3f31e7dbfb51c2d45539c3f2981aba0ab4b9291a8a5bd1dcd6f099d1fe106d6d7a4fd34796baff213ab244215eb35ec369ba1f20b15c35d63b