Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
87e5dcb02f61ef2182304357ce1bf06e_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
87e5dcb02f61ef2182304357ce1bf06e_JaffaCakes118.exe
-
Size
95KB
-
MD5
87e5dcb02f61ef2182304357ce1bf06e
-
SHA1
95fd9335eb432bfcf2ec850a1e663bf1ab4901be
-
SHA256
8943ed28c6d1d8f0e9792acfc2e47bfb21adc1d006a751a91c30fc6ba0868e22
-
SHA512
6246266f88977d13f6d14e7e9360ae5c8aa6d21e63c1f526e28ad669023f49f8b56780d53b2b85f63b180e72d4d4aed028f596adc55223fb56161230485d3a84
-
SSDEEP
1536:X0FusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prh8sze8KZtAd:XGS4jHS8q/3nTzePCwNUh4E9h8bhtAd
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/files/0x00080000000234cd-15.dat family_gh0strat behavioral2/memory/2360-18-0x0000000000400000-0x000000000044E37C-memory.dmp family_gh0strat behavioral2/memory/3336-21-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/4876-26-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/1668-31-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Deletes itself 1 IoCs
pid Process 2360 mquthjmroc -
Executes dropped EXE 1 IoCs
pid Process 2360 mquthjmroc -
Loads dropped DLL 3 IoCs
pid Process 3336 svchost.exe 4876 svchost.exe 1668 svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\swpxtefyhl svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\socflbdctq svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\swpxtefyhl svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 1412 3336 WerFault.exe 92 3132 4876 WerFault.exe 97 3120 1668 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87e5dcb02f61ef2182304357ce1bf06e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mquthjmroc Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2360 mquthjmroc 2360 mquthjmroc -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 2360 mquthjmroc Token: SeBackupPrivilege 2360 mquthjmroc Token: SeBackupPrivilege 2360 mquthjmroc Token: SeRestorePrivilege 2360 mquthjmroc Token: SeBackupPrivilege 3336 svchost.exe Token: SeRestorePrivilege 3336 svchost.exe Token: SeBackupPrivilege 3336 svchost.exe Token: SeBackupPrivilege 3336 svchost.exe Token: SeSecurityPrivilege 3336 svchost.exe Token: SeSecurityPrivilege 3336 svchost.exe Token: SeBackupPrivilege 3336 svchost.exe Token: SeBackupPrivilege 3336 svchost.exe Token: SeSecurityPrivilege 3336 svchost.exe Token: SeBackupPrivilege 3336 svchost.exe Token: SeBackupPrivilege 3336 svchost.exe Token: SeSecurityPrivilege 3336 svchost.exe Token: SeBackupPrivilege 3336 svchost.exe Token: SeRestorePrivilege 3336 svchost.exe Token: SeBackupPrivilege 4876 svchost.exe Token: SeRestorePrivilege 4876 svchost.exe Token: SeBackupPrivilege 4876 svchost.exe Token: SeBackupPrivilege 4876 svchost.exe Token: SeSecurityPrivilege 4876 svchost.exe Token: SeSecurityPrivilege 4876 svchost.exe Token: SeBackupPrivilege 4876 svchost.exe Token: SeBackupPrivilege 4876 svchost.exe Token: SeSecurityPrivilege 4876 svchost.exe Token: SeBackupPrivilege 4876 svchost.exe Token: SeBackupPrivilege 4876 svchost.exe Token: SeSecurityPrivilege 4876 svchost.exe Token: SeBackupPrivilege 4876 svchost.exe Token: SeRestorePrivilege 4876 svchost.exe Token: SeBackupPrivilege 1668 svchost.exe Token: SeRestorePrivilege 1668 svchost.exe Token: SeBackupPrivilege 1668 svchost.exe Token: SeBackupPrivilege 1668 svchost.exe Token: SeSecurityPrivilege 1668 svchost.exe Token: SeSecurityPrivilege 1668 svchost.exe Token: SeBackupPrivilege 1668 svchost.exe Token: SeBackupPrivilege 1668 svchost.exe Token: SeSecurityPrivilege 1668 svchost.exe Token: SeBackupPrivilege 1668 svchost.exe Token: SeBackupPrivilege 1668 svchost.exe Token: SeSecurityPrivilege 1668 svchost.exe Token: SeBackupPrivilege 1668 svchost.exe Token: SeRestorePrivilege 1668 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2360 2584 87e5dcb02f61ef2182304357ce1bf06e_JaffaCakes118.exe 87 PID 2584 wrote to memory of 2360 2584 87e5dcb02f61ef2182304357ce1bf06e_JaffaCakes118.exe 87 PID 2584 wrote to memory of 2360 2584 87e5dcb02f61ef2182304357ce1bf06e_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\87e5dcb02f61ef2182304357ce1bf06e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\87e5dcb02f61ef2182304357ce1bf06e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
\??\c:\users\admin\appdata\local\mquthjmroc"C:\Users\Admin\AppData\Local\Temp\87e5dcb02f61ef2182304357ce1bf06e_JaffaCakes118.exe" a -sc:\users\admin\appdata\local\temp\87e5dcb02f61ef2182304357ce1bf06e_jaffacakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3336 -s 7722⤵
- Program crash
PID:1412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3336 -ip 33361⤵PID:3312
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 10362⤵
- Program crash
PID:3132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4876 -ip 48761⤵PID:2644
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 8162⤵
- Program crash
PID:3120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1668 -ip 16681⤵PID:812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22.6MB
MD5cc36e4096ff7808d512ddaa06472d4d3
SHA12c0ff6406e51bdf351c547000e6ca8550bf34f61
SHA256f77617f11c295eb6db45b01fb38cfaa68288ba49bee6f6c9e5fb2fca45cbb5bc
SHA512a80566a0edbe88b0f138980b9384be0fe851ae3c7ca68832abb531cc22075ecf7e083152ca002dab0c9972564beec2a29fa7a0931cec501c5944059b2191569d
-
Filesize
203B
MD5d47edd42c76c0712b8d2a1915974b52b
SHA1b20ffbdbbae71b24a0d3d2f14e21761b9a8359bd
SHA256d5f88fa5e9d8c583ff9bac1cf53948341bfcda0daa15089153f4c546ca2c3bec
SHA5120026a3a5fcc000fc60ab9f6c2b9c2389af53b0fc7477851bcde9d1735d57aac06d96ba66ff878ee7c846c05a52b74caa5ce7111998a403f848d230131c3f92c4
-
Filesize
304B
MD58fdb99f26075b18cd8e9d7a66c793d9a
SHA152646043aacf3c9a12a3dc14b5b0062a3953f9b6
SHA256d257cdceebfc4cca3a28665218ebd83b9a60be995206e4e5b675078e369b7e28
SHA512a6802f877adb2ab9fd9d7680b0cc20a12fe443bc562bf4757b935e499ab9b336e009fddc31500e253c3aa9a971dc708fd1fb1f8092000335d4c786b4dbead852
-
Filesize
23.1MB
MD535e643193979e9dd31b6b7e77a2a5925
SHA13324abbcd66510c95a6046ad2a6531ea83f5c3c2
SHA25614f4e13ec4a0cee947b869cbd30714a0b6035c02683df918c6eeddb9f2686172
SHA512d086213311b502939ce871c7ae81f6a2e6a4d585ff280002ad560b5e1276fc2a910f3cff28afd7c7492a28f30c54f057d4ec0d0c9bd2a38bc8f05e630b5de4c2