Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/07/2024, 16:35

General

  • Target

    230f85c7314051e503c0693c98935f46_JaffaCakes118.exe

  • Size

    153KB

  • MD5

    230f85c7314051e503c0693c98935f46

  • SHA1

    ba8377965e6278e1c93eba970fa427094a4d5d9d

  • SHA256

    0a693852ca4bbbeb1c64196a3b6fd71300337306e149b9fd3a6119b48aa71447

  • SHA512

    8c7c0ff33312258b3eac3de0f4344efacb1c2e98fedcd056a0bbd0d4b1705ced40cfb2dd6ceacb39da53c4fe482d30860babc86ed866f805af44018bca2c6263

  • SSDEEP

    3072:NJ/dNdJ7OwMX7cPCW9WXlXOFaSHr0HDcNPxuGeOF6outFnA:/T7OwMXo7oX8oSHr0HDw6oS2

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\230f85c7314051e503c0693c98935f46_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\230f85c7314051e503c0693c98935f46_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\230F85~1.EXE > nul
      2⤵
        PID:3956
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k 1275078
      1⤵
      • Loads dropped DLL
      PID:3820

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\windows\SysWOW64\1275078.dll

      Filesize

      73KB

      MD5

      01dda7389c62fd054d4f12e85a49195b

      SHA1

      4952818fbc4da8a5c1ba5f7d77f74929fb135974

      SHA256

      b98f798e249858de97a1193da6f127c207227b19a06e4417d33179f79f7ae46d

      SHA512

      a419a16f1b163c3f75d2abe47c2c4abe7a73dac468c9312ec52e72ad24bdb9d6ec4c238dce83ebd8e2504bd3ab63f20ca06c9a8fe9a1a67347a394f89f7d0e0e

    • memory/1732-0-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1732-7-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/3820-8-0x0000000010000000-0x000000001002A000-memory.dmp

      Filesize

      168KB

    • memory/3820-9-0x00000000005D0000-0x00000000005D3000-memory.dmp

      Filesize

      12KB

    • memory/3820-10-0x0000000010000000-0x000000001002A000-memory.dmp

      Filesize

      168KB

    • memory/3820-12-0x0000000010017000-0x0000000010027000-memory.dmp

      Filesize

      64KB

    • memory/3820-13-0x0000000010000000-0x000000001002A000-memory.dmp

      Filesize

      168KB

    • memory/3820-14-0x0000000010000000-0x000000001002A000-memory.dmp

      Filesize

      168KB

    • memory/3820-16-0x00000000005D0000-0x00000000005D3000-memory.dmp

      Filesize

      12KB

    • memory/3820-17-0x0000000010017000-0x0000000010027000-memory.dmp

      Filesize

      64KB

    • memory/3820-18-0x0000000010000000-0x000000001002A000-memory.dmp

      Filesize

      168KB