Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
4af3eb17b08c45ea5b377cfc7432b1df_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4af3eb17b08c45ea5b377cfc7432b1df_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4af3eb17b08c45ea5b377cfc7432b1df_JaffaCakes118.exe
-
Size
128KB
-
MD5
4af3eb17b08c45ea5b377cfc7432b1df
-
SHA1
761042688c6892117f64669346990b5c88d04fb8
-
SHA256
031ce207a9348ca92047b2ff3cde60d6c608e02491d14dbecbe29c51c6b532b5
-
SHA512
8c1e0c7445e63853d2ff735127a04e445bcb6b8da51903b9285f3ee3659806887fc0ab589ed2d89535d4e42b8cb52d1f3292497f36bf641df602aacb84a72b38
-
SSDEEP
3072:xxwbcHVICc7soi3rK+/7uqelMYa3S1H2N:nwbAVFc7st3rK+/7uqelMYa3S1HS
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yaojif.exe -
Executes dropped EXE 1 IoCs
pid Process 2760 yaojif.exe -
Loads dropped DLL 2 IoCs
pid Process 2812 4af3eb17b08c45ea5b377cfc7432b1df_JaffaCakes118.exe 2812 4af3eb17b08c45ea5b377cfc7432b1df_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /t" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /m" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /S" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /w" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /k" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /x" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /i" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /V" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /R" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /C" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /Q" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /A" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /B" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /D" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /v" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /P" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /F" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /g" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /u" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /c" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /y" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /K" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /X" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /n" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /J" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /a" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /h" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /H" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /I" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /d" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /q" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /z" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /E" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /b" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /l" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /s" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /O" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /W" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /r" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /N" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /f" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /j" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /T" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /L" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /o" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /p" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /Y" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /U" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /Z" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /M" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /G" yaojif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaojif = "C:\\Users\\Admin\\yaojif.exe /e" yaojif.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe 2760 yaojif.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2812 4af3eb17b08c45ea5b377cfc7432b1df_JaffaCakes118.exe 2760 yaojif.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2760 2812 4af3eb17b08c45ea5b377cfc7432b1df_JaffaCakes118.exe 30 PID 2812 wrote to memory of 2760 2812 4af3eb17b08c45ea5b377cfc7432b1df_JaffaCakes118.exe 30 PID 2812 wrote to memory of 2760 2812 4af3eb17b08c45ea5b377cfc7432b1df_JaffaCakes118.exe 30 PID 2812 wrote to memory of 2760 2812 4af3eb17b08c45ea5b377cfc7432b1df_JaffaCakes118.exe 30 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29 PID 2760 wrote to memory of 2812 2760 yaojif.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4af3eb17b08c45ea5b377cfc7432b1df_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4af3eb17b08c45ea5b377cfc7432b1df_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\yaojif.exe"C:\Users\Admin\yaojif.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD58ea7b1fdcbb421f7b65e5187e072e6f5
SHA115be5168beaa7c2e6072f24d1f9b3a10c0c77447
SHA256fd0328795e39fb98742dc54d74d677625160562a70c087cde74a329d0b92e425
SHA5127d3d1e1f28df0364a58f887b98b17969a14218ae0e073ab23749492ffa790ef690ad70c7995d050db61ac69b7f7f2b70e4e8643eef85797c13662995284a4414