Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 01:13
Behavioral task
behavioral1
Sample
2a75dabc2a57cef8e28d51fa5b8846dc_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2a75dabc2a57cef8e28d51fa5b8846dc_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2a75dabc2a57cef8e28d51fa5b8846dc_JaffaCakes118.exe
-
Size
201KB
-
MD5
2a75dabc2a57cef8e28d51fa5b8846dc
-
SHA1
00598bf46fc2d03f07899f2f19ae532b0b6630e1
-
SHA256
435fff1a152ee768f785c628917634c1b79f40c83b953ef51bd263b907b282c0
-
SHA512
4b504c0d80f34e857150816a6d693f1050e8c7e85f89929a582d4428a2f67915efc28af22aaae1292a69f29efed74ec2b79678e0b0560f04775694dac605cb7e
-
SSDEEP
6144:WsIs6nW8Q3BTyPRqyhYPbHcTBlhHrGndnkI0W:bmW8hJq8YPbHcT3mV
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0007000000012118-2.dat family_gh0strat behavioral1/files/0x0009000000015d11-9.dat family_gh0strat behavioral1/memory/1736-12-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Deletes itself 1 IoCs
pid Process 2748 hxcbkmovtp -
Executes dropped EXE 1 IoCs
pid Process 2748 hxcbkmovtp -
Loads dropped DLL 2 IoCs
pid Process 2636 2a75dabc2a57cef8e28d51fa5b8846dc_JaffaCakes118.exe 1736 svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\nirctvhmiy svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2748 hxcbkmovtp 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeRestorePrivilege 2748 hxcbkmovtp Token: SeBackupPrivilege 2748 hxcbkmovtp Token: SeBackupPrivilege 2748 hxcbkmovtp Token: SeRestorePrivilege 2748 hxcbkmovtp Token: SeBackupPrivilege 1736 svchost.exe Token: SeRestorePrivilege 1736 svchost.exe Token: SeBackupPrivilege 1736 svchost.exe Token: SeBackupPrivilege 1736 svchost.exe Token: SeSecurityPrivilege 1736 svchost.exe Token: SeSecurityPrivilege 1736 svchost.exe Token: SeBackupPrivilege 1736 svchost.exe Token: SeBackupPrivilege 1736 svchost.exe Token: SeSecurityPrivilege 1736 svchost.exe Token: SeBackupPrivilege 1736 svchost.exe Token: SeBackupPrivilege 1736 svchost.exe Token: SeSecurityPrivilege 1736 svchost.exe Token: SeBackupPrivilege 1736 svchost.exe Token: SeRestorePrivilege 1736 svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2748 2636 2a75dabc2a57cef8e28d51fa5b8846dc_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2748 2636 2a75dabc2a57cef8e28d51fa5b8846dc_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2748 2636 2a75dabc2a57cef8e28d51fa5b8846dc_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2748 2636 2a75dabc2a57cef8e28d51fa5b8846dc_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2748 2636 2a75dabc2a57cef8e28d51fa5b8846dc_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2748 2636 2a75dabc2a57cef8e28d51fa5b8846dc_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2748 2636 2a75dabc2a57cef8e28d51fa5b8846dc_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a75dabc2a57cef8e28d51fa5b8846dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a75dabc2a57cef8e28d51fa5b8846dc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2636 -
\??\c:\users\admin\appdata\local\hxcbkmovtp"C:\Users\Admin\AppData\Local\Temp\2a75dabc2a57cef8e28d51fa5b8846dc_JaffaCakes118.exe" a -sc:\users\admin\appdata\local\temp\2a75dabc2a57cef8e28d51fa5b8846dc_jaffacakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22.1MB
MD56a8b1ce885834434167d9addbf59b2b4
SHA153d66a6ef62615ae36c0b68e7d5f3603b4f550d3
SHA256a5130778336364a352a6bcc061e2a0e91bd6a326f41c16949fd5e45d840778fb
SHA5121729594069a26a2a045a6c3df7962c62a29f1e4fdea148ef7979559eb60e07d54b08ed71f41124f4049eb794f4a75981fcb9cbb6df633a82b2760f6a9ebd9c18
-
Filesize
21.8MB
MD51963371852c13c5cecf679d8379031c2
SHA1efd3e1883c26724810e90769fc7f366357b5c5d2
SHA25635e2407151da02130e18e9534189fb7f1548a216aa459e40562e6800d6d6513d
SHA512c0e656ed844142d286e9bd1587c4d8bfc1b9a39aaf9adc033edee8dffcb7bd2c8313f878558dc67fb6d67ebe62193300ab0d8af44aad3cc90a4511cd5235e8ad