Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
3248fb9094e25aa840005b9c763e2b00_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3248fb9094e25aa840005b9c763e2b00_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3248fb9094e25aa840005b9c763e2b00_JaffaCakes118.exe
-
Size
188KB
-
MD5
3248fb9094e25aa840005b9c763e2b00
-
SHA1
cacb6cdb354d4f8f8ce6ecd84a249bd4e849d6bd
-
SHA256
6426d30c2ea733e1518219eba8c3d70ebc3d6e98106f513c56f6ade6b93eb03c
-
SHA512
fad7db4f0df830a0856e286b4c2421b8e641bbf31766c277d4f083bdade1c64060f700be25ff0a55e27f32e153ea0aabdb4f90d4f47225e2b4d0a48d0404c3ce
-
SSDEEP
3072:lO3IMonogaQNJDVAkAEftr/TE9qnUkG+k+g0C7Ed51OO0nf9z8f+srZrNg:9ogaQLVAEtbT9nUzf7+51/6S+GZh
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000c000000014968-5.dat family_gh0strat behavioral1/memory/1528-7-0x0000000010000000-0x0000000010027000-memory.dmp family_gh0strat behavioral1/memory/2452-8-0x0000000000400000-0x0000000000430000-memory.dmp family_gh0strat -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\fastuserswitchingcompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\alsgl.ref" 3248fb9094e25aa840005b9c763e2b00_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1528 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\d2f5ca0e.del 3248fb9094e25aa840005b9c763e2b00_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\alsgl.ref 3248fb9094e25aa840005b9c763e2b00_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2452 3248fb9094e25aa840005b9c763e2b00_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3248fb9094e25aa840005b9c763e2b00_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3248fb9094e25aa840005b9c763e2b00_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD534d611816388cfedce2ed544a0bcb731
SHA1f8823e8cd2fcb659f229e4882ab66968108624c9
SHA256b4743d5d6ffe692db0ad2d88850758ee791fac7a64a3538f44a894f3800eb445
SHA512d205981c90462dd1694a3c11e2421c066e80a72f3bb0c26dffc353a095dae93717aaad0eceeafd3e335f188a3a45df58bfa6a2eaccb011678662b4d1852c9e58