Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 16:10

General

  • Target

    3110403db8b3ac2087f607210321f8b3_JaffaCakes118.exe

  • Size

    300KB

  • MD5

    3110403db8b3ac2087f607210321f8b3

  • SHA1

    aa1b2527c5b5a309658bb7f272a4826c7faa9e9c

  • SHA256

    c329a169bc5d4000233d6ad94bb9d3268389b237d85132d9aab78d4f18c6a59e

  • SHA512

    9adc89b59daf5101fd2344a3b502ffe39b364f33879f3acfa8cb802055e433de9b6bb12320c860abe06638b55beb9af631cee781b8fc38490757d1360d36eec1

  • SSDEEP

    6144:JNOVLnWFcMFtsFkVRTl0QdTmNPPYhkUYeWlClcN0/dKUsV+DE:f8LWFr+kV1KIo+PWnWKzf

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Loads dropped DLL 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3110403db8b3ac2087f607210321f8b3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3110403db8b3ac2087f607210321f8b3_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1964
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    PID:2388
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    PID:2380
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    PID:2180
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k regsvc
    1⤵
      PID:3004

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\program files (x86)\%sessionname%\fqvwb.pic

      Filesize

      20.0MB

      MD5

      afa9326e5828b0e2cd9d59624e4e1e61

      SHA1

      71558d7d3130dbd045c016eb444b9d791a9b760a

      SHA256

      8de7cde26a14f2d95cb079472669d9e8b30b0aa7d5b103a3a8eb38b3185f8fd6

      SHA512

      6f720a3b0b5c8da9dc54ba90ef25b447ebf793344ef9c37d417ecfaa7a26432284e34db8a2875f2ea790ed11a360f058e6b97c387c223ea0f092b1816e987767

    • memory/1964-0-0x0000000000400000-0x000000000044B000-memory.dmp

      Filesize

      300KB

    • memory/1964-7-0x0000000000400000-0x000000000044B000-memory.dmp

      Filesize

      300KB