Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
82d4495d1cbcb834220066f3c7575c28_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
82d4495d1cbcb834220066f3c7575c28_JaffaCakes118.exe
-
Size
71KB
-
MD5
82d4495d1cbcb834220066f3c7575c28
-
SHA1
7b3613ba106b0e3be6fbe3f3ebb735574237ad30
-
SHA256
50d3e06114638664ab36a80980e0068d6fcd1de1425d60b391025cc8b0ddf03b
-
SHA512
815fecad26b95e6b1995794f88cadfad85ef11914fa837d1a2ee89a74207a7f02320199fc410237658155661af501ec522880703ec3cbedb461408b4efe3a615
-
SSDEEP
1536:5mcPaj6Y27da4+koc6BbJ31MsuVsBoJV0BF+zX3thgjE7:wEGOg4Yc6hJC+oT0OdYE7
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000e000000012025-7.dat family_gh0strat -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\svchest31317\Parameters\ServiceDll 82d4495d1cbcb834220066f3c7575c28_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2464 svchost.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\svchest31317.tmp 82d4495d1cbcb834220066f3c7575c28_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\svchest31317.tmp 82d4495d1cbcb834220066f3c7575c28_JaffaCakes118.exe File created C:\Program Files\Common Files\Hiv.ini 82d4495d1cbcb834220066f3c7575c28_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82d4495d1cbcb834220066f3c7575c28_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 2980 82d4495d1cbcb834220066f3c7575c28_JaffaCakes118.exe Token: SeRestorePrivilege 2980 82d4495d1cbcb834220066f3c7575c28_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\82d4495d1cbcb834220066f3c7575c28_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\82d4495d1cbcb834220066f3c7575c28_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe /k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31.1MB
MD507e21d1e1f2ff2583f39c76822702669
SHA1c949123d7ef93ecf4e41ee1ecbc86a808d7c38e9
SHA256bc6a8c968585bd9cf609a4b3a904da876f8115329af530da31751dc668c64cdf
SHA5122e72fcd142e9fda4a95c4d108cc5bd3472dec2c25b360e3033f6d807e44785d0110274eb82838079dac8dd77901ae08151df1778a3d97d26e4992959dc79bf7c