Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
0758e3a1dfb3d1d721042e0a8e62373a_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0758e3a1dfb3d1d721042e0a8e62373a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0758e3a1dfb3d1d721042e0a8e62373a_JaffaCakes118.exe
-
Size
204KB
-
MD5
0758e3a1dfb3d1d721042e0a8e62373a
-
SHA1
3f93743af81d1cfebd1f23ae967dd20dcef1b2e6
-
SHA256
9865fb72c203a823d2d865818335826396452dec506cfacda66ed0f61dbc0731
-
SHA512
250ba87489f71d2b21ea929a145c2345858a49cfff65fee502e64b34f0237f00c1e864aa5a9733517cd6f47798b81510b93535f0e58d670fc0bf6054d9a091e7
-
SSDEEP
3072:mmRW8oeM0tQ9nLHbB9W0c1TqECzR/mkSYGrl9ymgYUWoG:BANeM4QxL7B9W0c1RCzR/fSmljG
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" faafu.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0758e3a1dfb3d1d721042e0a8e62373a_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0758e3a1dfb3d1d721042e0a8e62373a_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2340 faafu.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /q" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /w" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /p" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /h" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /s" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /u" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /f" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /a" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /e" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /g" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /o" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /k" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /r" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /t" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /b" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /c" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /x" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /v" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /j" 0758e3a1dfb3d1d721042e0a8e62373a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /i" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /n" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /m" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /y" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /z" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /j" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /d" faafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faafu = "C:\\Users\\Admin\\faafu.exe /l" faafu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 968 0758e3a1dfb3d1d721042e0a8e62373a_JaffaCakes118.exe 968 0758e3a1dfb3d1d721042e0a8e62373a_JaffaCakes118.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe 2340 faafu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 968 0758e3a1dfb3d1d721042e0a8e62373a_JaffaCakes118.exe 2340 faafu.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 968 wrote to memory of 2340 968 0758e3a1dfb3d1d721042e0a8e62373a_JaffaCakes118.exe 86 PID 968 wrote to memory of 2340 968 0758e3a1dfb3d1d721042e0a8e62373a_JaffaCakes118.exe 86 PID 968 wrote to memory of 2340 968 0758e3a1dfb3d1d721042e0a8e62373a_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0758e3a1dfb3d1d721042e0a8e62373a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0758e3a1dfb3d1d721042e0a8e62373a_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\faafu.exe"C:\Users\Admin\faafu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5885597e8b3cded09f93ef0488a20aafc
SHA12eb28d7df25de73e92b19a7dde8e2cc3652bc05f
SHA25666648d14ce63e960965153a76045732390777b0d63828197ac5ea500ee996c43
SHA512f18bcafe6b0a7d8707baa9f95d6b5fa1d873245210cca791fa958e30db80c0048cef26d85de33f260ba67ade19490aaab2ef38f27d2191d7a58db213d3797475