Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 16:20

General

  • Target

    8b129a5b8b2d495537d6e902fafca7b2_JaffaCakes118.exe

  • Size

    737KB

  • MD5

    8b129a5b8b2d495537d6e902fafca7b2

  • SHA1

    f4fc78c4da30f08ef7a95cc47c1733aa86a5266a

  • SHA256

    fe7c6926e9f35eea5d5b075f4fd1abdb77fa6c60ebf0b2adc3d1b80d2c09f9b0

  • SHA512

    a5fdecb4d6d144a31144df7783e37fdaaba15705f46cc9dd3a14031d93e7da4b839f390d6b3fc4ee6ac16250c19deb2b0c41939427d6adf3c5125fa46f718a91

  • SSDEEP

    12288:NM5H1C52oxL3aKHx5r+TuxPhNWwgsAO3otNHANUTNlq:NM5H1C0w3aKHx5r+TuxPhpgpOmHq

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b129a5b8b2d495537d6e902fafca7b2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8b129a5b8b2d495537d6e902fafca7b2_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2360
    • \??\c:\Windows\svchest000.exe
      c:\Windows\svchest000.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchest000.exe

    Filesize

    737KB

    MD5

    8b129a5b8b2d495537d6e902fafca7b2

    SHA1

    f4fc78c4da30f08ef7a95cc47c1733aa86a5266a

    SHA256

    fe7c6926e9f35eea5d5b075f4fd1abdb77fa6c60ebf0b2adc3d1b80d2c09f9b0

    SHA512

    a5fdecb4d6d144a31144df7783e37fdaaba15705f46cc9dd3a14031d93e7da4b839f390d6b3fc4ee6ac16250c19deb2b0c41939427d6adf3c5125fa46f718a91

  • memory/2136-9-0x0000000000400000-0x00000000004ED000-memory.dmp

    Filesize

    948KB

  • memory/2360-0-0x0000000000400000-0x00000000004ED000-memory.dmp

    Filesize

    948KB

  • memory/2360-7-0x0000000002B10000-0x0000000002BFD000-memory.dmp

    Filesize

    948KB

  • memory/2360-12-0x0000000000400000-0x00000000004ED000-memory.dmp

    Filesize

    948KB

  • memory/2360-13-0x0000000002B10000-0x0000000002BFD000-memory.dmp

    Filesize

    948KB