Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 09:24
Static task
static1
Behavioral task
behavioral1
Sample
21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe
-
Size
152KB
-
MD5
21d9eb60714e4800705343eb59fab2cc
-
SHA1
0439caff552910d599cda26eb99dd008ccde3727
-
SHA256
dbf040b824f0b90084f5147c3ce60059964b8064775535545b88efb91af0c58d
-
SHA512
f10ba75e80be5b0dcd63766768876dba11b39954010de440c7dda46663ca08f3eb83887b9cf00bfc461e9b48e8fc6d4b7ba13f6bd213426ec0a2a390d1e550df
-
SSDEEP
3072:HMGOPYYh0Zq+7DxNUbaxIcz93bOButK+kAq:q+7DxVh3bHU7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fuuohox.exe -
Executes dropped EXE 1 IoCs
pid Process 2176 fuuohox.exe -
Loads dropped DLL 2 IoCs
pid Process 2792 21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe 2792 21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /j" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /r" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /A" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /f" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /N" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /e" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /Q" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /t" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /M" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /k" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /H" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /T" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /E" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /b" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /c" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /q" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /G" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /m" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /d" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /p" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /x" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /D" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /B" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /I" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /R" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /y" 21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /O" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /Z" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /C" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /Y" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /s" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /a" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /v" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /g" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /F" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /i" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /X" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /h" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /u" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /S" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /w" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /o" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /L" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /V" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /U" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /W" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /n" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /z" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /l" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /K" fuuohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuuohox = "C:\\Users\\Admin\\fuuohox.exe /y" fuuohox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2792 21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe 2176 fuuohox.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2792 21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe 2176 fuuohox.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2176 2792 21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe 28 PID 2792 wrote to memory of 2176 2792 21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe 28 PID 2792 wrote to memory of 2176 2792 21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe 28 PID 2792 wrote to memory of 2176 2792 21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\fuuohox.exe"C:\Users\Admin\fuuohox.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD535f8fdb35bf1c855d4d2d6b74e7ca080
SHA14065a4039db48ce365bb537f037a84665625a0a6
SHA256f0077aabebd871ed8aa71c1a6ea55a057567a6aba5a053f139276ccc8b1f4af0
SHA51222673736fc26cf56ccc84df13e97f71f0c0f0bf3d97bec1db9b7447447657e78be7adc45ab6df040a2dbc2be737b91081dcfaaaa4b2104894757d312dbc63842