Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 03:01
Static task
static1
Behavioral task
behavioral1
Sample
2467d3c78455637e8724a59d39116da0_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2467d3c78455637e8724a59d39116da0_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
2467d3c78455637e8724a59d39116da0_JaffaCakes118.exe
-
Size
232KB
-
MD5
2467d3c78455637e8724a59d39116da0
-
SHA1
566e7e00f7e0dc4d990304a7acb9b697271b0f33
-
SHA256
76649dcd507a9035dc0b7cebfd29cb9ff06be0dee2a95edc83a0dadf27031c2f
-
SHA512
948709d8bf892db449f1e0e1e441572f3b4a1f124ea16abd7771fe87aeca355c9ffd56eb97b580d7e96758238c28c273997bb3da3cdfcaa30d17bb620dd74ea2
-
SSDEEP
6144:ey1J3PFKs78vpRTlEqxF6snji81RUinKbLg:RPhpg
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2467d3c78455637e8724a59d39116da0_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" roaihor.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation 2467d3c78455637e8724a59d39116da0_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4992 roaihor.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /u" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /m" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /y" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /h" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /n" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /a" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /i" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /w" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /o" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /s" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /c" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /f" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /e" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /l" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /b" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /r" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /j" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /k" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /g" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /d" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /x" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /z" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /t" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /t" 2467d3c78455637e8724a59d39116da0_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /q" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /p" roaihor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roaihor = "C:\\Users\\Admin\\roaihor.exe /v" roaihor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3316 2467d3c78455637e8724a59d39116da0_JaffaCakes118.exe 3316 2467d3c78455637e8724a59d39116da0_JaffaCakes118.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe 4992 roaihor.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3316 2467d3c78455637e8724a59d39116da0_JaffaCakes118.exe 4992 roaihor.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3316 wrote to memory of 4992 3316 2467d3c78455637e8724a59d39116da0_JaffaCakes118.exe 98 PID 3316 wrote to memory of 4992 3316 2467d3c78455637e8724a59d39116da0_JaffaCakes118.exe 98 PID 3316 wrote to memory of 4992 3316 2467d3c78455637e8724a59d39116da0_JaffaCakes118.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2467d3c78455637e8724a59d39116da0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2467d3c78455637e8724a59d39116da0_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\roaihor.exe"C:\Users\Admin\roaihor.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4244,i,3833046924978547022,12404847742964713612,262144 --variations-seed-version --mojo-platform-channel-handle=3776 /prefetch:81⤵PID:3996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD51d52ba853c74d50c1637a69e534faa6c
SHA1522368f1699e576952fca43ee5e64a08ae817143
SHA25696953639819cf51ea31d4756efb6fb1d12769de8a6ad78ad7777b84b83c668fb
SHA512491497b0a26ed503398abbaa5b6f5019fd2b5206e899b9e914281d452565668a72d61866fd9351fc95878781e301ffab6a9089696dc55901123120bbe6f19250