Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe
-
Size
180KB
-
MD5
5d3b4d49ca54858fcaf4fef968dfb455
-
SHA1
c6d2a51b5c2a1c686b5eb2449df37019b7ae6f16
-
SHA256
907f8085b7d94dd5d66ecef1f4a39e5d9026dea04d41a90ba3f1111ecb381309
-
SHA512
0ce53efe18952f33a5847f464d17d6ba413cffbc0e57c174b3ea4b3e7ae85ced7235e08a8ab811863a7fd48497bac2d3e93834d121e1f4e473226e275e3c6c20
-
SSDEEP
1536:tDX1ldcxKc8NMgeGU4AeGL0TxpKwmf8y0IpWur+2RPFYSUxBphFLji:FlfcSg4dgxkcrhRVUHFLO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" deoosob.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation 5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4764 deoosob.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /H" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /h" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /Q" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /D" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /T" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /O" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /o" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /r" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /d" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /p" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /e" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /X" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /v" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /Z" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /l" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /B" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /I" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /E" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /q" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /c" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /U" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /b" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /i" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /W" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /n" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /F" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /A" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /t" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /V" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /Y" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /u" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /k" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /P" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /g" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /R" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /J" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /m" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /K" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /f" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /C" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /S" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /M" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /N" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /z" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /s" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /x" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /a" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /L" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /j" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /w" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /G" deoosob.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deoosob = "C:\\Users\\Admin\\deoosob.exe /y" deoosob.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe 4764 deoosob.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3240 5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe 4764 deoosob.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3240 wrote to memory of 4764 3240 5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe 87 PID 3240 wrote to memory of 4764 3240 5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe 87 PID 3240 wrote to memory of 4764 3240 5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe 87 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83 PID 4764 wrote to memory of 3240 4764 deoosob.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\deoosob.exe"C:\Users\Admin\deoosob.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD555ba59364400989b00f52824e1b55fa2
SHA1773ff1f36080ad2496516ba7b4206286fa84f2fe
SHA256506d0f1bc7d878f93e60e75324cc92cf02016b8c463f05d6e7e865cbed072378
SHA512e185421e42b8376784bf0183f9c9a41e99ac4eea77e3bb3c5956257239fe3d1d242542a8843f9189d79a6d3ab35810c487206e5a037d6cb6498072d6ef6050a5