Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 17:59
Static task
static1
Behavioral task
behavioral1
Sample
0ffa6ea349631356919e805465475e80_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0ffa6ea349631356919e805465475e80_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0ffa6ea349631356919e805465475e80_JaffaCakes118.exe
-
Size
144KB
-
MD5
0ffa6ea349631356919e805465475e80
-
SHA1
cc564ed5ef69eb3bd9d647e2ba4ee2e877d4b488
-
SHA256
1e7466df08f222e35154af3d1e5344824af4997b6e25eb687244b821849466b6
-
SHA512
ec8fedaf2b2b39d209fd15e7c980833fd2be2a3b7a3ab81d1cb32957427df0550c5b91034a03f6f2d7d98b7d3c354cd8be7526e7da9af6446fcb1f0ebd1d2810
-
SSDEEP
3072:Wbsk9O8CWwgRkWwuXdzDwWX0fTIZOaA481GkQr+drjOBgqEqJ:WEWwuXdzDwWX0fTIZOaAYkQrGrjOBgh
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rouquu.exe -
Executes dropped EXE 1 IoCs
pid Process 2756 rouquu.exe -
Loads dropped DLL 2 IoCs
pid Process 2168 0ffa6ea349631356919e805465475e80_JaffaCakes118.exe 2168 0ffa6ea349631356919e805465475e80_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /R" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /j" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /P" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /N" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /B" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /n" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /X" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /L" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /r" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /W" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /q" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /C" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /d" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /w" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /a" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /D" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /o" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /E" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /x" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /i" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /e" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /m" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /h" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /z" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /g" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /y" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /S" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /p" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /l" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /J" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /Z" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /O" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /K" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /G" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /b" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /u" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /t" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /c" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /H" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /T" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /Y" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /M" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /k" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /f" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /A" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /Q" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /V" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /I" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /U" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /F" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /s" rouquu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rouquu = "C:\\Users\\Admin\\rouquu.exe /v" rouquu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rouquu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ffa6ea349631356919e805465475e80_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe 2756 rouquu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2168 0ffa6ea349631356919e805465475e80_JaffaCakes118.exe 2756 rouquu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2756 2168 0ffa6ea349631356919e805465475e80_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2756 2168 0ffa6ea349631356919e805465475e80_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2756 2168 0ffa6ea349631356919e805465475e80_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2756 2168 0ffa6ea349631356919e805465475e80_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ffa6ea349631356919e805465475e80_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0ffa6ea349631356919e805465475e80_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\rouquu.exe"C:\Users\Admin\rouquu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD52a5a2a5368dbb87cb47f389719dcc8b3
SHA14e5735c173dff79c3b95406219af7095fcd949b3
SHA256f3136da17e4fd5950241cc351456997e93ca8b0de75130deac1676acee088368
SHA51235fa9c8876f7c0b8a722e80f0a332bfd5d9a27bfc06a5deff453ede37915aaab55887bb9f14e316e159d6a4c657d84e10034d8475256814c0d068e22cac805af