Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2025, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_981ea9d151e05112a177fef2e6d2ace9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_981ea9d151e05112a177fef2e6d2ace9.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_981ea9d151e05112a177fef2e6d2ace9.exe
-
Size
92KB
-
MD5
981ea9d151e05112a177fef2e6d2ace9
-
SHA1
8aa814bab08c355bbf82390ee8a8c0dde4fc8d58
-
SHA256
dbde908f86073865714aceda6531cbffe9d3ff18b535ef0fbb3917e4ea4d483c
-
SHA512
0723a1f007ca26edd0ab38971b886d7d1f69836c1f3d67d386095e6b2eb441f10ec2f6af61e3e0c436ec2ad63f72de3fa418fe91e77f2f6e808ed2c7319c5913
-
SSDEEP
1536:VxhUvMSgPCoJZkzNOhwj7Hnv/NvyvJvSvbvfvTVPTpzBa:3hUvMSgKuWtVPxw
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kauohuq.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\Control Panel\International\Geo\Nation JaffaCakes118_981ea9d151e05112a177fef2e6d2ace9.exe -
Executes dropped EXE 1 IoCs
pid Process 4404 kauohuq.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /c" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /O" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /F" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /B" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /a" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /l" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /V" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /d" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /Z" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /A" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /n" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /N" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /M" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /Y" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /f" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /z" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /L" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /p" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /k" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /q" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /m" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /u" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /g" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /D" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /o" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /J" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /h" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /K" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /S" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /G" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /U" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /i" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /y" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /W" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /t" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /x" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /I" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /P" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /Q" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /T" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /w" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /e" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /b" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /R" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /H" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /v" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /s" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /X" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /j" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /E" kauohuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauohuq = "C:\\Users\\Admin\\kauohuq.exe /C" kauohuq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_981ea9d151e05112a177fef2e6d2ace9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kauohuq.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe 4404 kauohuq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1068 JaffaCakes118_981ea9d151e05112a177fef2e6d2ace9.exe 4404 kauohuq.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1068 wrote to memory of 4404 1068 JaffaCakes118_981ea9d151e05112a177fef2e6d2ace9.exe 89 PID 1068 wrote to memory of 4404 1068 JaffaCakes118_981ea9d151e05112a177fef2e6d2ace9.exe 89 PID 1068 wrote to memory of 4404 1068 JaffaCakes118_981ea9d151e05112a177fef2e6d2ace9.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_981ea9d151e05112a177fef2e6d2ace9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_981ea9d151e05112a177fef2e6d2ace9.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\kauohuq.exe"C:\Users\Admin\kauohuq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4404
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5687f2e5bf7a9fde5a62bdcd114cda65a
SHA1bd8e2d8c013e027cb3a12561b9fb29d8023c2259
SHA256de4e35f9d8c7d91063933dc0b1e0293145fa6130327e4201c0dcc38648af4977
SHA51280cc7a85dd6f10703ea583391d47d653d2a3bbc00bb821c9c3b557208996c108a88d0ebe760cbeaf7db51115625cf215f3212682f15cfa585fb24f42f8e5ab2a