Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 00:01
Behavioral task
behavioral1
Sample
697da8736697daa8d917fde5aff080da_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
697da8736697daa8d917fde5aff080da_JaffaCakes118.exe
-
Size
130KB
-
MD5
697da8736697daa8d917fde5aff080da
-
SHA1
d331691dde9da1aa10012970f0f1bbe23f8b6750
-
SHA256
04355b5fe9d33c498a14ed31e39a368ceb1e6329b2c342031adce5e835579c7b
-
SHA512
572ee9e068231ba297415c959116a1557522ab0edeb0bbc54a8c1d2a1605d71cf04ee6d0151f0019f706d988125e59e4c7682392e69fbd2eac6e35c5bce014a4
-
SSDEEP
3072:q1YWjH+5P4fRKmPfjCTbx6qciEdZzcYSk:qn6p457PrwxF9Yzcl
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x000a0000000234c0-3.dat family_gh0strat behavioral2/files/0x000f00000002341a-12.dat family_gh0strat -
Deletes itself 1 IoCs
pid Process 3976 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 4964 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe 3976 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Gwxyabcde.jpg 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe File created C:\Windows\SysWOW64\Gwxyabcde.jpg 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 4964 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe Token: SeRestorePrivilege 4964 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe Token: SeBackupPrivilege 4964 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe Token: SeRestorePrivilege 4964 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe Token: SeBackupPrivilege 4964 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe Token: SeRestorePrivilege 4964 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe Token: SeBackupPrivilege 4964 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe Token: SeRestorePrivilege 4964 697da8736697daa8d917fde5aff080da_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\697da8736697daa8d917fde5aff080da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\697da8736697daa8d917fde5aff080da_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42.1MB
MD5b40d19aee2c66eb9adfc34de437655eb
SHA126270c04be8f29a8620fe54f0de6c0f61718cfc1
SHA256efe74fd7963c4b97a569481c0cd94a1b03c0f1968943566c5b2086a9aed0fe7b
SHA512de1850328c1d6323b2ddbba8cf33ac79fc2611d32f5765e0df33140d99ff225b45e99e6a6213ff59924057067f5eb99c7cd7dacafe17baf660ba58b98f314f2e
-
Filesize
98B
MD5ec2b5b4fd1354e18fe2464661c04928e
SHA152e6df7b9d78aef844b95690eb0eca09fe48d985
SHA2568611cde9bcff8c9c18f6651d289a98791f77114e5ab5601d87a044b94039be2a
SHA512ae703bd422a16b79300d08a9709806106d83b65201cd3886f340cbbe76add06bb70a7387bb8732f8979eac04a04526fabade2904d36e497e43bc6498b3491120
-
Filesize
47.0MB
MD52a1ad06cb8c6792e88f9781b4bc75585
SHA1f39012b1f29316f93336eca47b94aeba4f29c26c
SHA256260ac2d1875c348bb61576f675e26a4099b7a18a9a84c8f980a83bddc575a4ec
SHA51220337b183d8bc621b3ab3a99736ceaa77eb0eec51e48c2024e462dea4a12e475b00b4341edd6b2ebbe9d254b75627172fac29bbb24197457c92adca62420c2e9