Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
f07e293cfd3af6c38e4e6bf6ccb92a3b_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f07e293cfd3af6c38e4e6bf6ccb92a3b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f07e293cfd3af6c38e4e6bf6ccb92a3b_JaffaCakes118.exe
-
Size
248KB
-
MD5
f07e293cfd3af6c38e4e6bf6ccb92a3b
-
SHA1
d919de2a5e2de10dd038eff37ae45dfc400289c4
-
SHA256
b136f2e7c8e75a5beb54a30697974475763d61d806ea89562602a8ba56490426
-
SHA512
2c62d47cff8e5fde5ec68e1a3495ad675f1fa92b7fd115139b1a4ea67a85b75a06de9572078fe970751ca94617d3543099f8c594e4926e69b768ddd1808c0772
-
SSDEEP
1536:4t6u3c9YmmU9YDkl8NMhgoAeK6Kg0xCZTqUX3wkSQ7tNXZKl/YWAISDKow5z/GHD:A6u3kaUWDklPANxCLX3uDcdZDXp
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wauage.exe -
Executes dropped EXE 1 IoCs
pid Process 2400 wauage.exe -
Loads dropped DLL 2 IoCs
pid Process 2524 f07e293cfd3af6c38e4e6bf6ccb92a3b_JaffaCakes118.exe 2524 f07e293cfd3af6c38e4e6bf6ccb92a3b_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /y" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /Y" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /r" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /x" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /u" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /Q" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /G" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /M" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /E" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /o" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /s" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /p" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /t" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /L" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /B" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /j" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /H" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /F" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /n" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /a" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /c" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /Z" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /b" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /N" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /f" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /g" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /z" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /k" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /P" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /X" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /i" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /C" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /O" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /J" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /e" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /U" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /W" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /d" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /q" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /S" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /w" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /T" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /V" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /K" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /m" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /I" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /v" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /l" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /D" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /A" wauage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\wauage = "C:\\Users\\Admin\\wauage.exe /h" wauage.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wauage.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f07e293cfd3af6c38e4e6bf6ccb92a3b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe 2400 wauage.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2524 f07e293cfd3af6c38e4e6bf6ccb92a3b_JaffaCakes118.exe 2400 wauage.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2400 2524 f07e293cfd3af6c38e4e6bf6ccb92a3b_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2400 2524 f07e293cfd3af6c38e4e6bf6ccb92a3b_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2400 2524 f07e293cfd3af6c38e4e6bf6ccb92a3b_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2400 2524 f07e293cfd3af6c38e4e6bf6ccb92a3b_JaffaCakes118.exe 31 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29 PID 2400 wrote to memory of 2524 2400 wauage.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f07e293cfd3af6c38e4e6bf6ccb92a3b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f07e293cfd3af6c38e4e6bf6ccb92a3b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\wauage.exe"C:\Users\Admin\wauage.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD50780aa9cb57f5062a4d63c082aff3a2f
SHA1707722042a34530731a93fde43e9c9d649283bfa
SHA2564bf93fba0ff3df601ae47fa0e8e08607cb7b4564ecda19bd3187725c989dfbd4
SHA512e6b365307b5f5f9c0ff17315cf892f95562fda5dcfd53b59da0a8240140a230368c0917299d74f1a825463b952578fa6ad9cc14d049c9c52adc17afc8effda59