Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 20:01
Static task
static1
Behavioral task
behavioral1
Sample
362c3a0db7bad840174ef3deb76f49a7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
362c3a0db7bad840174ef3deb76f49a7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
362c3a0db7bad840174ef3deb76f49a7_JaffaCakes118.exe
-
Size
172KB
-
MD5
362c3a0db7bad840174ef3deb76f49a7
-
SHA1
d24627dac4a0b231da91d3ec2bb14785afe71714
-
SHA256
941d31ef8e2909b088638b6f39f3a2cae30d6e0301fd31703bfc686aaaf84d7c
-
SHA512
68ab377d7dd60d8b50d832d865ff3926a221b87759408d25d2daf1848423a167b17e2cffad4b6f20379271e1d679d321a42a29413f82bd36e4230c2e2b7afecb
-
SSDEEP
3072:7crmzTIqg4AmWXHSlDMehogxgbDT5qouyX7UgZgkaDqKEmvqsg+j:7UKlAmWXHSlDMehogxgbDTQouyXYgZgB
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" teuube.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation 362c3a0db7bad840174ef3deb76f49a7_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2880 teuube.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /T" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /W" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /d" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /s" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /P" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /C" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /q" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /D" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /L" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /I" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /H" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /f" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /F" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /V" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /G" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /J" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /O" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /w" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /i" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /Y" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /A" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /g" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /n" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /p" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /S" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /a" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /b" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /R" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /Q" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /u" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /N" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /t" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /B" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /k" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /y" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /E" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /j" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /z" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /v" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /r" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /c" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /l" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /U" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /e" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /h" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /Z" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /X" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /M" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /K" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /m" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /x" teuube.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuube = "C:\\Users\\Admin\\teuube.exe /o" teuube.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe 2880 teuube.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3012 362c3a0db7bad840174ef3deb76f49a7_JaffaCakes118.exe 2880 teuube.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2880 3012 362c3a0db7bad840174ef3deb76f49a7_JaffaCakes118.exe 86 PID 3012 wrote to memory of 2880 3012 362c3a0db7bad840174ef3deb76f49a7_JaffaCakes118.exe 86 PID 3012 wrote to memory of 2880 3012 362c3a0db7bad840174ef3deb76f49a7_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\362c3a0db7bad840174ef3deb76f49a7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\362c3a0db7bad840174ef3deb76f49a7_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\teuube.exe"C:\Users\Admin\teuube.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD516a2c8a63dcead2f02e223651d862ea8
SHA1ed1efdb7e217f4383d47644eed45a9a0103b2aef
SHA2560603aad3730ac7b4e9828d7fd00249834813cd16677713ecdbc9775505e121fb
SHA512c74753d140d98dae9b04a5d2c1f9b72815295e1c0ed3842bb647b689194ec756986525cab8feaf058ec9d16e030f30abd6ee2aeddc6291939f08ef24aa29021a