Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 03:59
Behavioral task
behavioral1
Sample
82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe
-
Size
198KB
-
MD5
82f2716ba60da548c40b7b900d3c8287
-
SHA1
d8eb82d5ac1fcda00f401de4c5e5ffac125e3872
-
SHA256
8954f89ab35c094149d31786dd2b0861651ddfc0cdc472eb979e1a41d913e050
-
SHA512
7eaf4817bbee02b3d8d10ac2da179ab5c5cc9d7560bade08842f8b5660268a16d3cff41a9b7055c736723cb31740a842377808538e414d3ecc8562d3f3c5b21d
-
SSDEEP
6144:tNny7a4tEGnTH5thy7r+P3QHNmmi25ttBOxjMoF:+btV1thyaQHNxTbAgo
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/files/0x00080000000234ad-7.dat family_gh0strat behavioral2/memory/228-10-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/1268-13-0x0000000000400000-0x00000000004BD000-memory.dmp family_gh0strat behavioral2/memory/228-16-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3089151618-2647890268-2710988337-1000\Control Panel\International\Geo\Nation 82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 228 server.exe -
Loads dropped DLL 1 IoCs
pid Process 228 server.exe -
resource yara_rule behavioral2/memory/1268-0-0x0000000000400000-0x00000000004BD000-memory.dmp upx behavioral2/memory/1268-13-0x0000000000400000-0x00000000004BD000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Thunder.pic 82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Comres.dll 82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe File created C:\Windows\addins\server.exe 82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe File opened for modification C:\Windows\addins\server.exe.txt server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2440 228 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6F5C6FFDE75F2E539455F2D600FD0CBD4754EC28 82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6F5C6FFDE75F2E539455F2D600FD0CBD4754EC28\Blob = 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 82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1268 82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe 1268 82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1268 82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe Token: SeRestorePrivilege 1268 82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1268 82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1268 wrote to memory of 228 1268 82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe 86 PID 1268 wrote to memory of 228 1268 82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe 86 PID 1268 wrote to memory of 228 1268 82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe 86 PID 1268 wrote to memory of 3868 1268 82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe 89 PID 1268 wrote to memory of 3868 1268 82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe 89 PID 1268 wrote to memory of 3868 1268 82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\82f2716ba60da548c40b7b900d3c8287_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\addins\server.exe"C:\Windows\addins\server.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 8763⤵
- Program crash
PID:2440
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\82F271~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 228 -ip 2281⤵PID:4020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25.1MB
MD5c73552cb6d89163e18086ac6bd399c42
SHA1fa8904d727c50d51d983c246a33ce091723ae51d
SHA2561b62353be26feca155efe724000b03873380dcfc4906a4f68bd2731a3ed98929
SHA51236c57ca61dfe051dd97b8b1e153d247792d3ce3c9f29937a71d3ae2845dfc2a6bc54e9a150ef5f94935f09bd1f61964742132772ce2aa14fc62b29360695c87b
-
Filesize
3KB
MD589f2fc1c954dc2ce23839f1be4889235
SHA119dcd7582c3f0a6d30e239406fe0a018c4475b7e
SHA25642acb90376d4b5b9c60f457ef3ab2dce684e6ec2ade03bebd672ca9a9ebce82d
SHA512c46ea15af9760d46cc4c182d27be6115f9ace613f12eb55bc4738fe9c56f97f88a4a3ab902cbc82336bcc77589b1b892479df44fae1ed1ac398c92e1215ac849