Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
457d793b3596a22e316ce2b366307636_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
457d793b3596a22e316ce2b366307636_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
457d793b3596a22e316ce2b366307636_JaffaCakes118.exe
-
Size
92KB
-
MD5
457d793b3596a22e316ce2b366307636
-
SHA1
887bade56139e44578372cf8b6029e4bbbcd4a14
-
SHA256
0e3d11914c9f888d8a57ea29a94bd2f3f543b4583a2025401edb4d160c3cbb62
-
SHA512
bd2318f94fa4a221ab7e75fafdf95c23b90b8aaed127f14f48b95acf7de6335bbd55ce7a1dbc261dbfc1a419ede7c4451e5f6fb0ddcbad21a1dc0aba56b14178
-
SSDEEP
1536:BGxBaPKsZLyJxFdhXgI0TRQP/FY0Y6Y2YkYGYHRHNxtwv4RaoacXcmKdHEa:GaPDpCH6QP/uRNBcx5
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" faaxeog.exe -
Executes dropped EXE 1 IoCs
pid Process 2644 faaxeog.exe -
Loads dropped DLL 2 IoCs
pid Process 2112 457d793b3596a22e316ce2b366307636_JaffaCakes118.exe 2112 457d793b3596a22e316ce2b366307636_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /P" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /i" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /I" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /b" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /q" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /V" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /A" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /n" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /L" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /N" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /E" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /J" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /o" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /O" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /T" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /h" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /C" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /w" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /x" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /M" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /s" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /U" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /g" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /e" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /l" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /R" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /c" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /H" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /u" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /Q" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /z" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /Y" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /k" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /t" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /r" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /G" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /W" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /y" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /m" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /D" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /B" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /K" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /a" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /v" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /Z" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /F" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /j" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /p" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /d" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /X" faaxeog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaxeog = "C:\\Users\\Admin\\faaxeog.exe /S" faaxeog.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe 2644 faaxeog.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2112 457d793b3596a22e316ce2b366307636_JaffaCakes118.exe 2644 faaxeog.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2644 2112 457d793b3596a22e316ce2b366307636_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2644 2112 457d793b3596a22e316ce2b366307636_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2644 2112 457d793b3596a22e316ce2b366307636_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2644 2112 457d793b3596a22e316ce2b366307636_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\457d793b3596a22e316ce2b366307636_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\457d793b3596a22e316ce2b366307636_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\faaxeog.exe"C:\Users\Admin\faaxeog.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD56909b74e6518fca359950c2dec4f7443
SHA15aefc8d5d6993103ec3ae2a51b990d36643b50df
SHA2569e25da8430f37c68668093d8befd6c9357989d3559d65f8c602d1a7987c6b91b
SHA5127b843ee9bfaf33f56d54f9e74dca80d31b1d8319248540e849902675d8545c6360fe71a83d4c315776c7fee43d8d94a7ad88518861935687ce18e207a99d8b57