Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 00:01
Behavioral task
behavioral1
Sample
697da8736697daa8d917fde5aff080da_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
697da8736697daa8d917fde5aff080da_JaffaCakes118.exe
-
Size
130KB
-
MD5
697da8736697daa8d917fde5aff080da
-
SHA1
d331691dde9da1aa10012970f0f1bbe23f8b6750
-
SHA256
04355b5fe9d33c498a14ed31e39a368ceb1e6329b2c342031adce5e835579c7b
-
SHA512
572ee9e068231ba297415c959116a1557522ab0edeb0bbc54a8c1d2a1605d71cf04ee6d0151f0019f706d988125e59e4c7682392e69fbd2eac6e35c5bce014a4
-
SSDEEP
3072:q1YWjH+5P4fRKmPfjCTbx6qciEdZzcYSk:qn6p457PrwxF9Yzcl
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000c000000015dff-6.dat family_gh0strat behavioral1/memory/1952-10-0x0000000010000000-0x0000000010024000-memory.dmp family_gh0strat behavioral1/files/0x000b000000012266-13.dat family_gh0strat -
Deletes itself 1 IoCs
pid Process 1692 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1692 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Gwxyabcde.jpg 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe File created C:\Windows\SysWOW64\Gwxyabcde.jpg 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 1952 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe Token: SeRestorePrivilege 1952 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe Token: SeBackupPrivilege 1952 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe Token: SeRestorePrivilege 1952 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe Token: SeBackupPrivilege 1952 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe Token: SeRestorePrivilege 1952 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe Token: SeBackupPrivilege 1952 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe Token: SeRestorePrivilege 1952 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\697da8736697daa8d917fde5aff080da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\697da8736697daa8d917fde5aff080da_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42.1MB
MD5b40d19aee2c66eb9adfc34de437655eb
SHA126270c04be8f29a8620fe54f0de6c0f61718cfc1
SHA256efe74fd7963c4b97a569481c0cd94a1b03c0f1968943566c5b2086a9aed0fe7b
SHA512de1850328c1d6323b2ddbba8cf33ac79fc2611d32f5765e0df33140d99ff225b45e99e6a6213ff59924057067f5eb99c7cd7dacafe17baf660ba58b98f314f2e
-
Filesize
51.9MB
MD5f559da1de7806df12f9399b5f8ce22a1
SHA16de6e535063f3f702ce8e46a8c9ac5227bf565b2
SHA256ccec5bbc76bf2248a8a30518191309d48e83c80321d7fb745b419e2fb9ca28be
SHA512397345e29ee87ccff9b44ec2eb048d8be38c93b8b2971c26e7c762e6541ad3f17fac1599242a4d2de2dff5556dfa6dd3d0da4d75ed6147cdf605e0064f135689
-
Filesize
98B
MD5a7dd621489ddd11812d0da85297531c3
SHA1a613365ef150b1b960b807be00502c78c3abce3b
SHA256cbff4077b907c27cbe668f2964062c841a0fe686882d508ea76fe0e734da84e5
SHA512776ddb15c7f57f03bc16dce711f60ea1d2cb87a74873e41bb40efcf6c4321bc2bc71a0fcf465c550d661ae2d752fbf1fa312265867b30eb2594525e8885f18ff