Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
5fd6aa9e2fe037c0449dc8f666aac026_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5fd6aa9e2fe037c0449dc8f666aac026_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5fd6aa9e2fe037c0449dc8f666aac026_JaffaCakes118.exe
-
Size
96KB
-
MD5
5fd6aa9e2fe037c0449dc8f666aac026
-
SHA1
63c5473fe56b2591b1c2b28ccd74a95cd1e67e6b
-
SHA256
34d84084a3007372e7abace3a7daaf4cf9f642bb2531e3d2aeb294123d00f204
-
SHA512
658214425034a0884b480adf28ae4c39c12bddebc9a07ed286ab1364574f5ffd320079b5385f5e3c0b7881501978c41a205749fcbdce9ec39a5d262c15a1ef4a
-
SSDEEP
1536:FgQBH8f6cO/hwnkGulSc16l6u+NMMl/KlYv1Tq5ThFfNIjnZZ2:9/hwYlu8CFFfCnr2
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5fd6aa9e2fe037c0449dc8f666aac026_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" reagau.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 5fd6aa9e2fe037c0449dc8f666aac026_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 968 reagau.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /g" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /r" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /D" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /d" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /S" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /O" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /w" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /Q" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /u" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /B" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /U" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /W" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /F" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /l" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /s" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /P" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /X" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /e" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /Z" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /J" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /k" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /f" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /z" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /D" 5fd6aa9e2fe037c0449dc8f666aac026_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /m" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /p" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /R" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /h" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /M" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /Y" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /b" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /o" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /N" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /v" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /G" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /A" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /i" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /c" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /C" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /j" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /V" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /x" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /a" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /n" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /y" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /K" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /I" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /T" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /t" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /E" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /q" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /L" reagau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reagau = "C:\\Users\\Admin\\reagau.exe /H" reagau.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5088 5fd6aa9e2fe037c0449dc8f666aac026_JaffaCakes118.exe 5088 5fd6aa9e2fe037c0449dc8f666aac026_JaffaCakes118.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe 968 reagau.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5088 5fd6aa9e2fe037c0449dc8f666aac026_JaffaCakes118.exe 968 reagau.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5088 wrote to memory of 968 5088 5fd6aa9e2fe037c0449dc8f666aac026_JaffaCakes118.exe 89 PID 5088 wrote to memory of 968 5088 5fd6aa9e2fe037c0449dc8f666aac026_JaffaCakes118.exe 89 PID 5088 wrote to memory of 968 5088 5fd6aa9e2fe037c0449dc8f666aac026_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fd6aa9e2fe037c0449dc8f666aac026_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5fd6aa9e2fe037c0449dc8f666aac026_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\reagau.exe"C:\Users\Admin\reagau.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD534656969775c7415fc5d433249d7186a
SHA1ab292d9c83eb839bb12001fd30e734cbbffcb5fc
SHA256c08dd3ea22b5daea8d3f240b273043700598b8b53bfcc5574a6a9067b32c127a
SHA512ab0b5c1a58f5589a08d62aa2d6b069d45c6938f9c76bc6b44886c93fe78e810edd05d62496502faced8813d091ae2f71ed220f57bafe8aa9f2bced480617cd85