Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 18:26
Static task
static1
Behavioral task
behavioral1
Sample
872a501ce53c3a9281f991d8b8b658fc_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
872a501ce53c3a9281f991d8b8b658fc_JaffaCakes118.exe
-
Size
96KB
-
MD5
872a501ce53c3a9281f991d8b8b658fc
-
SHA1
be1748619b990d141fe1cd1a7387ba07d95e6eb5
-
SHA256
19be25c510de09e9ac0f3acd7704bc96e7b6744fdf0ab090fc2efcdb70b4fb71
-
SHA512
b0322fe11cdfc7d91b7cd60ea3e88d031b2dbedefd9183ab706fbc281a07fe613c51c58c560a6a3eb072353f5d84e090b8e80438642a7540ae05b70c30f0768d
-
SSDEEP
1536:zHFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prFzTqjQOwU:zxS4jHS8q/3nTzePCwNUh4E9snwU
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/files/0x0008000000023438-15.dat family_gh0strat behavioral2/memory/1612-18-0x0000000000400000-0x000000000044E304-memory.dmp family_gh0strat behavioral2/memory/1172-21-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/2708-26-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/3760-31-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Deletes itself 1 IoCs
pid Process 1612 dktyioeycb -
Executes dropped EXE 1 IoCs
pid Process 1612 dktyioeycb -
Loads dropped DLL 3 IoCs
pid Process 1172 svchost.exe 2708 svchost.exe 3760 svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\ipturxooux svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\ixinabrmis svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\ixinabrmis svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 3016 1172 WerFault.exe 92 4588 2708 WerFault.exe 97 3168 3760 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dktyioeycb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 872a501ce53c3a9281f991d8b8b658fc_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1612 dktyioeycb 1612 dktyioeycb -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 1612 dktyioeycb Token: SeBackupPrivilege 1612 dktyioeycb Token: SeBackupPrivilege 1612 dktyioeycb Token: SeRestorePrivilege 1612 dktyioeycb Token: SeBackupPrivilege 1172 svchost.exe Token: SeRestorePrivilege 1172 svchost.exe Token: SeBackupPrivilege 1172 svchost.exe Token: SeBackupPrivilege 1172 svchost.exe Token: SeSecurityPrivilege 1172 svchost.exe Token: SeSecurityPrivilege 1172 svchost.exe Token: SeBackupPrivilege 1172 svchost.exe Token: SeBackupPrivilege 1172 svchost.exe Token: SeSecurityPrivilege 1172 svchost.exe Token: SeBackupPrivilege 1172 svchost.exe Token: SeBackupPrivilege 1172 svchost.exe Token: SeSecurityPrivilege 1172 svchost.exe Token: SeBackupPrivilege 1172 svchost.exe Token: SeRestorePrivilege 1172 svchost.exe Token: SeBackupPrivilege 2708 svchost.exe Token: SeRestorePrivilege 2708 svchost.exe Token: SeBackupPrivilege 2708 svchost.exe Token: SeBackupPrivilege 2708 svchost.exe Token: SeSecurityPrivilege 2708 svchost.exe Token: SeSecurityPrivilege 2708 svchost.exe Token: SeBackupPrivilege 2708 svchost.exe Token: SeBackupPrivilege 2708 svchost.exe Token: SeSecurityPrivilege 2708 svchost.exe Token: SeBackupPrivilege 2708 svchost.exe Token: SeBackupPrivilege 2708 svchost.exe Token: SeSecurityPrivilege 2708 svchost.exe Token: SeBackupPrivilege 2708 svchost.exe Token: SeRestorePrivilege 2708 svchost.exe Token: SeBackupPrivilege 3760 svchost.exe Token: SeRestorePrivilege 3760 svchost.exe Token: SeBackupPrivilege 3760 svchost.exe Token: SeBackupPrivilege 3760 svchost.exe Token: SeSecurityPrivilege 3760 svchost.exe Token: SeSecurityPrivilege 3760 svchost.exe Token: SeBackupPrivilege 3760 svchost.exe Token: SeBackupPrivilege 3760 svchost.exe Token: SeSecurityPrivilege 3760 svchost.exe Token: SeBackupPrivilege 3760 svchost.exe Token: SeBackupPrivilege 3760 svchost.exe Token: SeSecurityPrivilege 3760 svchost.exe Token: SeBackupPrivilege 3760 svchost.exe Token: SeRestorePrivilege 3760 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4900 wrote to memory of 1612 4900 872a501ce53c3a9281f991d8b8b658fc_JaffaCakes118.exe 87 PID 4900 wrote to memory of 1612 4900 872a501ce53c3a9281f991d8b8b658fc_JaffaCakes118.exe 87 PID 4900 wrote to memory of 1612 4900 872a501ce53c3a9281f991d8b8b658fc_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\872a501ce53c3a9281f991d8b8b658fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\872a501ce53c3a9281f991d8b8b658fc_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
\??\c:\users\admin\appdata\local\dktyioeycb"C:\Users\Admin\AppData\Local\Temp\872a501ce53c3a9281f991d8b8b658fc_JaffaCakes118.exe" a -sc:\users\admin\appdata\local\temp\872a501ce53c3a9281f991d8b8b658fc_jaffacakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 10882⤵
- Program crash
PID:3016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1172 -ip 11721⤵PID:4420
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 8802⤵
- Program crash
PID:4588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2708 -ip 27081⤵PID:2564
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 8842⤵
- Program crash
PID:3168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3760 -ip 37601⤵PID:4220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22.9MB
MD59f882f7eb1aea3c2d42e54479c1fad24
SHA1371994ea00c17c4c40f1cf919ad97c8d0a70fc23
SHA256d64709fd61141825d6e62b8eadf7d148aa1ce9ee92b5e4c3583ba3ff247dd75d
SHA512487de35d161f2e592128f0233e0a3761992d6368149d83e529a1a9f97b1788dd014d9e432da12957a5243b10fd403a52c3bf8b6e2299f7578c080ae202e8dc39
-
Filesize
204B
MD5c0cce2970ec1155033f6b8d21add74e6
SHA1d9d5b9145cf5c523e4c22124b7372a485483a150
SHA25643d22f0c7ac89225673a601690b47f29db04a914d559482c38228b7642a6b2e7
SHA512644fd9897b3bfafd5626bab8933422fe3a5b7d493fba7c2c8168382adff160b414224e1f64a7134183f8c820297076c1a7f606903d13654d9102d6303aebb789
-
Filesize
306B
MD5bcc58b0e4cd389c1a5832c41d83398c5
SHA193c59dab18ce947cab937984b8c0098c054491a4
SHA25670052de8424ea7f5823673763a97645a6360a954854bd2ee049a64ac66698f7f
SHA51255378115e5522da34a2a40d437ac2542083db600d5fc18af8a1ec995517ae1c60ce4efac1e51255e56e92e718f74d778130ab5459dbede7fcf7ac15124188258
-
Filesize
21.1MB
MD575378221a48f92f686b09a05e1ed94d9
SHA1f23597a7a625161aff10a7398dae377037cf6fbe
SHA2563b8387810962e5bf0697a3acd61147af9afb2f4e0aa6f38ac5c2c639656bb9f7
SHA512bb3481116fdfcbc5a0091b29e13c48c114ffd07b7a055994ba68ba0a721b9c3a3cf1b24243766fafbadaaf985024ba0c1592b96141cba52f34898c4271d32e2e