Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 06:22
Behavioral task
behavioral1
Sample
4d257e507fea62c60ec257db15f91e59_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4d257e507fea62c60ec257db15f91e59_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
2011528135322.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
2011528135322.exe
Resource
win10v2004-20240709-en
General
-
Target
2011528135322.exe
-
Size
204KB
-
MD5
1a24c5e8b0653ff5c5033c1970af459a
-
SHA1
eeaa099ef42414aaf4f7c48618cd66a6e2ba9e37
-
SHA256
779ba65f8947c9206cade7b181683380da0ef1b12a1a8de5c2e6c00d53574e9b
-
SHA512
006478b5fae5964ad5ede2b3277fcccfa54de68dff768110b7fb9ab184baa2b714d1d44717d3f760f480fbe1ec48f4e7e569dc030d073da7241825468d552f15
-
SSDEEP
3072:YqVYtrjsN9NhlcOAeT4WWDQ8KKwirAKVd8R8httUH31:FKtnsN9Nvc6DWECwyXX8RM831
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral4/files/0x000800000002346e-3.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 1936 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\V2011 = "C:\\WINDOWS\\V2011.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\WINDOWS\V2011.exe svchost.exe File created C:\WINDOWS\V2011.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3936 2011528135322.exe 3936 2011528135322.exe 1936 svchost.exe 1936 svchost.exe 1936 svchost.exe 1936 svchost.exe 1936 svchost.exe 1936 svchost.exe 1936 svchost.exe 1936 svchost.exe 1936 svchost.exe 1936 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1936 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1936 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3936 wrote to memory of 1936 3936 2011528135322.exe 84 PID 3936 wrote to memory of 1936 3936 2011528135322.exe 84 PID 3936 wrote to memory of 1936 3936 2011528135322.exe 84 PID 3936 wrote to memory of 4380 3936 2011528135322.exe 89 PID 3936 wrote to memory of 4380 3936 2011528135322.exe 89 PID 3936 wrote to memory of 4380 3936 2011528135322.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2011528135322.exe"C:\Users\Admin\AppData\Local\Temp\2011528135322.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\V2011\svchost.exeC:\Users\Admin\AppData\Local\Temp\V2011\svchost.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c afc9fe2f418b00a0.bat2⤵PID:4380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5ec90f103be0fb6843d50f46650245e51
SHA1fddb725431e370ed83fb655c8bf936a318dd6846
SHA25617693f603254482eefc76b46becc430aed49ecc70bef7bc8816fd83059da8382
SHA5123edd8d0dbbe342b323d9ba825ffe25be9b6c5a9805280e7c403bd8428fcfb51265dbd362c6cdbff082323f383d1c53f1088e74f2b9e86557947a1b00f0d72eea
-
Filesize
2KB
MD5c278bb1ed716377a08b995ff7d9cab5c
SHA18292efb97a4e48579adc419172c9d3340226252d
SHA25668ad3c8b3074a09adea23fafb51cf367f6297c1de626b39925294cc492bd36a9
SHA51282f524ba37fc9d29a04bc1c438624da52f3a365728d417e0c2156806088fc29256ab5bb5d9933580aa17189a55cff5021859311b60c415ba45e85fd13bf2ff9f