Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 22:47
Behavioral task
behavioral1
Sample
e89a03e73f12ec65040118c69b721c59_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e89a03e73f12ec65040118c69b721c59_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
201151922243.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
201151922243.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
2011519222254.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
2011519222254.exe
Resource
win10v2004-20240226-en
General
-
Target
201151922243.exe
-
Size
25.1MB
-
MD5
2f30d031eceaa35e41d78363747f9182
-
SHA1
c5d467e10167330cdc5c4d859a81ffdd0c1ac101
-
SHA256
52ab1dfca531c1b409af062478f1926d86fec266fe1c90a61c70676633cef8a5
-
SHA512
b4729afc5910f8b37ef0b5a2591b52b13da5fd0d259ef8f5af1e798f71c9630d9b004dca8301b5d7a820d516d86ddc198ae52eb43a22edc1a73a1a830bd9c71d
-
SSDEEP
3072:ALk395hYXJ708xqm3AdPSNtQ0SH54TiQgIwNxHv/YZzwCrddCnIsJBXc:AQqB00R3AdYbOUoIwNlnDCrddCxdc
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral3/files/0x000b000000012266-2.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2056 2011519222254.exe -
Loads dropped DLL 5 IoCs
pid Process 2240 201151922243.exe 2240 201151922243.exe 2056 2011519222254.exe 2056 2011519222254.exe 2056 2011519222254.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ball = "C:\\WINDOWS\\Ball.exe" 2011519222254.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\Ball.exe 2011519222254.exe File opened for modification C:\WINDOWS\Ball.exe 2011519222254.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2056 2011519222254.exe 2056 2011519222254.exe 2056 2011519222254.exe 2056 2011519222254.exe 2056 2011519222254.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2056 2011519222254.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2056 2240 201151922243.exe 28 PID 2240 wrote to memory of 2056 2240 201151922243.exe 28 PID 2240 wrote to memory of 2056 2240 201151922243.exe 28 PID 2240 wrote to memory of 2056 2240 201151922243.exe 28 PID 2240 wrote to memory of 2056 2240 201151922243.exe 28 PID 2240 wrote to memory of 2056 2240 201151922243.exe 28 PID 2240 wrote to memory of 2056 2240 201151922243.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\201151922243.exe"C:\Users\Admin\AppData\Local\Temp\201151922243.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\temp\2011519222254.exe"C:\Windows\temp\2011519222254.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5a8247344600b8cdf4f8debe3c8493ba8
SHA1bbc3ac5475dcdb16c4f38a180dbefb8dcefce4d0
SHA256639cbbed21a4c8cbf9d63ef3952fdc0078a816e4703b2c91557dce082d7d0063
SHA512cfa753ae805fd21db0fd1fea23f65b59173c589c77ea5fd73a9471647751c82d3d6d3d08f2a92a056a3e13f13fc93e8e9eb88fb5dd79d008232a27badfa994dd