Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
457d793b3596a22e316ce2b366307636_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
457d793b3596a22e316ce2b366307636_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
457d793b3596a22e316ce2b366307636_JaffaCakes118.exe
-
Size
92KB
-
MD5
457d793b3596a22e316ce2b366307636
-
SHA1
887bade56139e44578372cf8b6029e4bbbcd4a14
-
SHA256
0e3d11914c9f888d8a57ea29a94bd2f3f543b4583a2025401edb4d160c3cbb62
-
SHA512
bd2318f94fa4a221ab7e75fafdf95c23b90b8aaed127f14f48b95acf7de6335bbd55ce7a1dbc261dbfc1a419ede7c4451e5f6fb0ddcbad21a1dc0aba56b14178
-
SSDEEP
1536:BGxBaPKsZLyJxFdhXgI0TRQP/FY0Y6Y2YkYGYHRHNxtwv4RaoacXcmKdHEa:GaPDpCH6QP/uRNBcx5
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xooexu.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation 457d793b3596a22e316ce2b366307636_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4228 xooexu.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /g" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /z" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /V" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /w" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /K" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /b" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /C" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /h" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /N" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /o" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /r" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /Y" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /q" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /P" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /Z" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /O" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /R" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /x" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /p" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /v" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /D" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /d" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /T" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /m" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /X" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /t" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /J" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /l" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /n" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /s" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /G" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /S" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /W" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /a" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /M" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /u" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /i" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /I" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /e" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /E" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /f" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /H" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /y" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /A" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /L" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /Q" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /c" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /F" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /B" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /k" xooexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xooexu = "C:\\Users\\Admin\\xooexu.exe /j" xooexu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe 4228 xooexu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4008 457d793b3596a22e316ce2b366307636_JaffaCakes118.exe 4228 xooexu.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4008 wrote to memory of 4228 4008 457d793b3596a22e316ce2b366307636_JaffaCakes118.exe 86 PID 4008 wrote to memory of 4228 4008 457d793b3596a22e316ce2b366307636_JaffaCakes118.exe 86 PID 4008 wrote to memory of 4228 4008 457d793b3596a22e316ce2b366307636_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\457d793b3596a22e316ce2b366307636_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\457d793b3596a22e316ce2b366307636_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\xooexu.exe"C:\Users\Admin\xooexu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD56ba7cf018fc7b63698e4703a14f4cc55
SHA19b77118df519f9c4c46ae8acff2c7c6c48ce30e8
SHA25632e3fe8862ef85bc12bf674876406ecee646cbc50f6df876378ede09781cb2a7
SHA512905546a996fb80e3ab3382dfb8a3fd711914b029e4b8cc49ab12d8ac075f1efd29a0e356c5aa7d1abd722f29ed27ee4a123c6b2be6aab9e751971172ebb3a7ea