Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 20:10
Static task
static1
Behavioral task
behavioral1
Sample
64a196046475050ed52beced2f720f0a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
64a196046475050ed52beced2f720f0a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
64a196046475050ed52beced2f720f0a_JaffaCakes118.exe
-
Size
106KB
-
MD5
64a196046475050ed52beced2f720f0a
-
SHA1
e2d6a0b74008303dfea21255400a549451c949c3
-
SHA256
032e9862298a2f663cccaef747da9c672f3365cb4cdf7641de45a1516e0c309f
-
SHA512
1721fed6db10b7e133d3e9a351c46bef193ed45198b4c694d98616087c526ac4dadcd8b6982fafd0bb2ae5a5ea9615d85b9ad1122755c25e729c168e30bd5713
-
SSDEEP
3072:OSJKxamnBJ6WGx8AilK8q8x10QkdWjWZ8M6ZPENOL5wepcJfsbR/zgZc8lGnjvko:xcLZfPPfL
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" youjaas.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation 64a196046475050ed52beced2f720f0a_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4628 youjaas.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youjaas = "C:\\Users\\Admin\\youjaas.exe" youjaas.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe 4628 youjaas.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3152 64a196046475050ed52beced2f720f0a_JaffaCakes118.exe 4628 youjaas.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3152 wrote to memory of 4628 3152 64a196046475050ed52beced2f720f0a_JaffaCakes118.exe 89 PID 3152 wrote to memory of 4628 3152 64a196046475050ed52beced2f720f0a_JaffaCakes118.exe 89 PID 3152 wrote to memory of 4628 3152 64a196046475050ed52beced2f720f0a_JaffaCakes118.exe 89 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83 PID 4628 wrote to memory of 3152 4628 youjaas.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\64a196046475050ed52beced2f720f0a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\64a196046475050ed52beced2f720f0a_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\youjaas.exe"C:\Users\Admin\youjaas.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD509e95ffbd84bd985ec2d3fd04d6139a3
SHA1572cf3a4b88b98b6e0f8fedcffa5a2e50a1f2dfa
SHA25635216dac6a3d834e0e13c147c8d14db1608f1b543cb42c9b9b1b777277884d27
SHA512d6be1cab1878c7aaef60e719bf5c946ed3d80034baba6ee15d43f58cb6457fb34998c1fc8412cf9ee54d48078ce55fb4308ce967b3d3fc2fbe2dc9255007aca1