Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
17eb3bce064cfb844d164aa1d8c7daaa_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
17eb3bce064cfb844d164aa1d8c7daaa_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
17eb3bce064cfb844d164aa1d8c7daaa_JaffaCakes118.exe
-
Size
88KB
-
MD5
17eb3bce064cfb844d164aa1d8c7daaa
-
SHA1
1c15176ff59566bb3302855398abec0696ba2b03
-
SHA256
2385bd1cba79a627373c4fa98a8cff91d58d31bae77ee51293e91c68cf55602f
-
SHA512
1c44662e95eaaa8dce869ee205745e002d04c92a0334bdb109e2058e2916c216b1ad3333a943e066c44613a54e7ec2b7d3c8d8d95fb1730633f44a7602707b6a
-
SSDEEP
768:tt4celx1XGFE6oKmgSRl5HcJR0t20rdg8hUPjvY4dW4dsoeKpAdDY4BO0BCZc/UO:n3ev5GFk7RPnQpBeCZk9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" riotii.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 17eb3bce064cfb844d164aa1d8c7daaa_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3612 riotii.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riotii = "C:\\Users\\Admin\\riotii.exe" riotii.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe 3612 riotii.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3932 17eb3bce064cfb844d164aa1d8c7daaa_JaffaCakes118.exe 3612 riotii.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3932 wrote to memory of 3612 3932 17eb3bce064cfb844d164aa1d8c7daaa_JaffaCakes118.exe 81 PID 3932 wrote to memory of 3612 3932 17eb3bce064cfb844d164aa1d8c7daaa_JaffaCakes118.exe 81 PID 3932 wrote to memory of 3612 3932 17eb3bce064cfb844d164aa1d8c7daaa_JaffaCakes118.exe 81 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80 PID 3612 wrote to memory of 3932 3612 riotii.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\17eb3bce064cfb844d164aa1d8c7daaa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\17eb3bce064cfb844d164aa1d8c7daaa_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\riotii.exe"C:\Users\Admin\riotii.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD54b26ffbfce31ddcd1bee52c5a36be5c9
SHA1ce5d2a11f9e98b420ed67db085f1226bb12560d4
SHA256dc8caf8ffd63674096f4ed9603da3c5334d637b578f135d97afcd2691a454901
SHA5124336488277c64150c34bee4a58cb7069504c249b9f1503ff7b6ca1d490c3052182bff51157881e288316a46531d8df22bbc44eaf87fb254fcf0831d07b1a03bf