Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 18:55
Behavioral task
behavioral1
Sample
8b6dd69af41aa243e9fb12cfbd426735_JaffaCakes118.exe
Resource
win7-20240221-en
7 signatures
150 seconds
General
-
Target
8b6dd69af41aa243e9fb12cfbd426735_JaffaCakes118.exe
-
Size
107KB
-
MD5
8b6dd69af41aa243e9fb12cfbd426735
-
SHA1
99d514ddfbccc6ee576f0a1d8143975972c2777e
-
SHA256
156268ea966642cff53b0d5ece4903fbaebddbcb5e3f446dff27780d30cb5a73
-
SHA512
417367bc202e47b303fb94a872a33dfefe6753716d61f203384b2a966c097af7a3407d18d9eb7708f955a1b3f87293417501dff6c1351207904fa964fdb19551
-
SSDEEP
3072:m46miUV9IWE3e+68oHVR1GcNck0Q0q0bCRiH7aW:m4HvQWEu+6D1j6ksnbCRiH7a
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/3008-1-0x0000000010000000-0x0000000010032000-memory.dmp family_gh0strat behavioral1/memory/3008-5-0x0000000000400000-0x0000000000440000-memory.dmp family_gh0strat -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 8b6dd69af41aa243e9fb12cfbd426735_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 8b6dd69af41aa243e9fb12cfbd426735_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8b6dd69af41aa243e9fb12cfbd426735_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/3008-0-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral1/memory/3008-5-0x0000000000400000-0x0000000000440000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8b6dd69af41aa243e9fb12cfbd426735_JaffaCakes118.exe" 8b6dd69af41aa243e9fb12cfbd426735_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8b6dd69af41aa243e9fb12cfbd426735_JaffaCakes118.exe -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 8b6dd69af41aa243e9fb12cfbd426735_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8b6dd69af41aa243e9fb12cfbd426735_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 8b6dd69af41aa243e9fb12cfbd426735_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1