Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 16:26
Behavioral task
behavioral1
Sample
230876a57d507995553887fa1c603e14_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
230876a57d507995553887fa1c603e14_JaffaCakes118.exe
-
Size
127KB
-
MD5
230876a57d507995553887fa1c603e14
-
SHA1
3a2ae4d54f6ff85dad52267005c4dc09b4fc3c6e
-
SHA256
cc0f7546d28bb46aa072e1a94e75221a8d00244cfa53b4afc9a0217d9da3395b
-
SHA512
c2eddefd1f3d98d339c6141cea4564d8841cc99fa9166d39c38ec35f10316f6e3c54bbe1102ed9196dc5dadbe980976edcde98d0239afae2e41d9b6301d0aea8
-
SSDEEP
3072:V7CaO7x8fC8t52oja+rKttHkoIIu6kfif20wNA:V7pON8ao++wKodjkqfXC
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000b00000001485e-5.dat family_gh0strat behavioral1/memory/2564-9-0x0000000010000000-0x0000000010028000-memory.dmp family_gh0strat behavioral1/files/0x000e000000012264-12.dat family_gh0strat -
Deletes itself 1 IoCs
pid Process 1740 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1740 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Fbcd\Kbcdefghi.gif 230876a57d507995553887fa1c603e14_JaffaCakes118.exe File created C:\Program Files (x86)\Fbcd\Kbcdefghi.gif 230876a57d507995553887fa1c603e14_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 2564 230876a57d507995553887fa1c603e14_JaffaCakes118.exe Token: SeRestorePrivilege 2564 230876a57d507995553887fa1c603e14_JaffaCakes118.exe Token: SeBackupPrivilege 2564 230876a57d507995553887fa1c603e14_JaffaCakes118.exe Token: SeRestorePrivilege 2564 230876a57d507995553887fa1c603e14_JaffaCakes118.exe Token: SeBackupPrivilege 2564 230876a57d507995553887fa1c603e14_JaffaCakes118.exe Token: SeRestorePrivilege 2564 230876a57d507995553887fa1c603e14_JaffaCakes118.exe Token: SeBackupPrivilege 2564 230876a57d507995553887fa1c603e14_JaffaCakes118.exe Token: SeRestorePrivilege 2564 230876a57d507995553887fa1c603e14_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\230876a57d507995553887fa1c603e14_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\230876a57d507995553887fa1c603e14_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1740
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD5ebb95c2321e080ee885ef60136aa8fa7
SHA19c89d4b106bb1d7979cc7731efbbee8f3d1ecdc6
SHA256bd6d2d2eb70370b70e94fc49278dee3815bf1589ee2c1bdc7fc0d34bd9b7600c
SHA512e331597f895506b72fc9ef3f694391d084e1daf97bc7b0d9c8e61618fe6694c599ca910156d3965956e00e2fd670752ab9ecc2054f0fc0626a3914594f35d5b8
-
Filesize
8.9MB
MD5161336cd8c2a429a1791ea2098e5f5f6
SHA15940ff46a508e902fc5d3a52ee7ddf30b2739c65
SHA2565d60094d898440edb0f43c7a1a5fd6e90fd8ec284ef6a7ddc65d0c641cbd1ff4
SHA5122085caa64c2737423874c798e90a545be846299087b4bcaa813b04e49677fa46ae7a61998d625b945f615fb3aa336f079cd8da123046e62e42864f7ac30adac7
-
Filesize
99B
MD5735fdf5598e8303d4b6f2ea69c52f3d8
SHA12cc85bd29d63b389bc380bd24e471ff7e26b08d8
SHA256e35aa77edbd20cc57f9b40fadce9be9af6a1b680c8ae7f67e1cc983e6f656e9e
SHA5128da0fea65b2ad9fc414329e0ee2b6d3adacee21e5f357c8330c083b74f1e2cd58fd39b34feda1b916ec7331747a9ebafdbbd5d87a518c6679c518563410fb5ce