Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 11:53
Behavioral task
behavioral1
Sample
1b3237069cb32b2e38a778105948b107_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1b3237069cb32b2e38a778105948b107_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1b3237069cb32b2e38a778105948b107_JaffaCakes118.exe
-
Size
174KB
-
MD5
1b3237069cb32b2e38a778105948b107
-
SHA1
3d443d78e881e94dd6d8eb39bcdb02fa3590de96
-
SHA256
9126e22dadd0ce19a8c93f3d5edc8931231ea9e3d963154db061d67897a74599
-
SHA512
333c5907f166ad531fd6ca060a99e7522fee874345d58a32ad8d368276e5279a1b272e8fcbdda1afab98b0de47dcec16573f8aa7e86ed7708a02ae04eb7256f6
-
SSDEEP
3072:VJuGnYhTbK80kSbOW1oWOQ1f9xHwm1PXBmXZFeA28pM6EdePl9dehiv80P80CnpH:VJueTkSOwoWOQ3dwaWB28edeP/deUv8M
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000b000000012281-3.dat family_gh0strat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 3 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{1E8FD9DB-AC78-f202-512F-80B8B603A5C6} userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1E8FD9DB-AC78-f202-512F-80B8B603A5C6}\ = "ϵͳÉèÖÃ" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1E8FD9DB-AC78-f202-512F-80B8B603A5C6}\stubpath = "þÿÿÿX" userinit.exe -
Loads dropped DLL 1 IoCs
pid Process 2556 userinit.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2072 1b3237069cb32b2e38a778105948b107_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2072 1b3237069cb32b2e38a778105948b107_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2556 2072 1b3237069cb32b2e38a778105948b107_JaffaCakes118.exe 28 PID 2072 wrote to memory of 2556 2072 1b3237069cb32b2e38a778105948b107_JaffaCakes118.exe 28 PID 2072 wrote to memory of 2556 2072 1b3237069cb32b2e38a778105948b107_JaffaCakes118.exe 28 PID 2072 wrote to memory of 2556 2072 1b3237069cb32b2e38a778105948b107_JaffaCakes118.exe 28 PID 2072 wrote to memory of 2556 2072 1b3237069cb32b2e38a778105948b107_JaffaCakes118.exe 28 PID 2072 wrote to memory of 2556 2072 1b3237069cb32b2e38a778105948b107_JaffaCakes118.exe 28 PID 2072 wrote to memory of 2556 2072 1b3237069cb32b2e38a778105948b107_JaffaCakes118.exe 28 PID 2072 wrote to memory of 2556 2072 1b3237069cb32b2e38a778105948b107_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b3237069cb32b2e38a778105948b107_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1b3237069cb32b2e38a778105948b107_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\userinit.exeuserinit.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD5dc2f3b2ce7e97d5dbae331c8e2b6d67f
SHA1d2c5fc55e39d5673a376253cf3c6b9aba014ff4f
SHA256d7cb1f91a6b603112178cfba22264325a4142b68dbf6af5c2a9bfdfad84b017d
SHA512096c96347f081fd3b70a33c855f922c7233adf04f5bb035f957cea15b2aed36c4115608c135a35acccd35a519b39fa0315752f940f9bc06f106b4c7234586de0