Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/07/2024, 00:01

General

  • Target

    697da8736697daa8d917fde5aff080da_JaffaCakes118.exe

  • Size

    130KB

  • MD5

    697da8736697daa8d917fde5aff080da

  • SHA1

    d331691dde9da1aa10012970f0f1bbe23f8b6750

  • SHA256

    04355b5fe9d33c498a14ed31e39a368ceb1e6329b2c342031adce5e835579c7b

  • SHA512

    572ee9e068231ba297415c959116a1557522ab0edeb0bbc54a8c1d2a1605d71cf04ee6d0151f0019f706d988125e59e4c7682392e69fbd2eac6e35c5bce014a4

  • SSDEEP

    3072:q1YWjH+5P4fRKmPfjCTbx6qciEdZzcYSk:qn6p457PrwxF9Yzcl

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\697da8736697daa8d917fde5aff080da_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\697da8736697daa8d917fde5aff080da_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:4964
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k imgsvc
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:3976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\564200.dll

    Filesize

    42.1MB

    MD5

    b40d19aee2c66eb9adfc34de437655eb

    SHA1

    26270c04be8f29a8620fe54f0de6c0f61718cfc1

    SHA256

    efe74fd7963c4b97a569481c0cd94a1b03c0f1968943566c5b2086a9aed0fe7b

    SHA512

    de1850328c1d6323b2ddbba8cf33ac79fc2611d32f5765e0df33140d99ff225b45e99e6a6213ff59924057067f5eb99c7cd7dacafe17baf660ba58b98f314f2e

  • \??\c:\NT_Path.jpg

    Filesize

    98B

    MD5

    ec2b5b4fd1354e18fe2464661c04928e

    SHA1

    52e6df7b9d78aef844b95690eb0eca09fe48d985

    SHA256

    8611cde9bcff8c9c18f6651d289a98791f77114e5ab5601d87a044b94039be2a

    SHA512

    ae703bd422a16b79300d08a9709806106d83b65201cd3886f340cbbe76add06bb70a7387bb8732f8979eac04a04526fabade2904d36e497e43bc6498b3491120

  • \??\c:\windows\SysWOW64\gwxyabcde.jpg

    Filesize

    47.0MB

    MD5

    2a1ad06cb8c6792e88f9781b4bc75585

    SHA1

    f39012b1f29316f93336eca47b94aeba4f29c26c

    SHA256

    260ac2d1875c348bb61576f675e26a4099b7a18a9a84c8f980a83bddc575a4ec

    SHA512

    20337b183d8bc621b3ab3a99736ceaa77eb0eec51e48c2024e462dea4a12e475b00b4341edd6b2ebbe9d254b75627172fac29bbb24197457c92adca62420c2e9