Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/08/2024, 01:37

General

  • Target

    8ccdf8857054fa2efc455b69258956a6_JaffaCakes118.exe

  • Size

    376KB

  • MD5

    8ccdf8857054fa2efc455b69258956a6

  • SHA1

    58bfe73edcb7c862e73bd35c6587ef12497295a1

  • SHA256

    9e30fdfa70ce4289e48461c2862f1806e79633c0416fff1832a30d665ce7c1e8

  • SHA512

    09a90013195ee2e9421681b81da399797de69f7bef96144a47bdc28d015b3b6331d65b7c3438a4ac6f8145181730412f15db39d74fe050cd88adfd5475fd25f1

  • SSDEEP

    6144:jfYte9zBUGBIVKH1yF2idZecnl20lHRxp3g/KzXHwxrE7eMsSgmLVFweF4X3Y:EUFBGVKVuF3Z4mxxmKjQxw73sSgmLVyw

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Drops file in Drivers directory 2 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: LoadsDriver 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ccdf8857054fa2efc455b69258956a6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8ccdf8857054fa2efc455b69258956a6_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Server Software Component: Terminal Services DLL
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:3668
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility
    1⤵
    • Drops file in Drivers directory
    • Deletes itself
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:1348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\240607000_ex.tmp

    Filesize

    98KB

    MD5

    6b474e54deab28181da70a050d4151a0

    SHA1

    195612d4bf09b048b975e2d00d89b01f9e3596da

    SHA256

    7d672902dea809e40ff20687585908378fdaae878348516440866818259b161f

    SHA512

    84425aadf73e17fc6f17dbc67f6f41068aad31bc9207d399e8a86794d62b0317a6da34030436c373891aab8f441494b49de3b02a7bc3829c0b939d41abc05ecb

  • \??\c:\windows\SysWOW64\fastuserswitchingcompatibilityex.dll

    Filesize

    98KB

    MD5

    5ca13d7275172cf65aef469ab17dcf1c

    SHA1

    aaf45fcb231f2ddc954f0005223ca5efec4aea44

    SHA256

    4d6189205944bd01df5f62a18abd74f4a3dbc255a185cb4c49b250d3f4fd58f3

    SHA512

    fe0a11320443165be6d4b3ddd5a009d6788adeaa2e503fbc2a80f996009a61aad82484783ea255a6337c520ebc9412d181effa57f465fbf29ee76b7b446e7717

  • memory/3668-14-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/3668-8-0x0000000002290000-0x0000000002291000-memory.dmp

    Filesize

    4KB

  • memory/3668-23-0x00000000024B0000-0x00000000024B1000-memory.dmp

    Filesize

    4KB

  • memory/3668-22-0x00000000024D0000-0x00000000024D1000-memory.dmp

    Filesize

    4KB

  • memory/3668-21-0x00000000024F0000-0x00000000024F1000-memory.dmp

    Filesize

    4KB

  • memory/3668-30-0x0000000000590000-0x0000000000591000-memory.dmp

    Filesize

    4KB

  • memory/3668-25-0x0000000002500000-0x0000000002501000-memory.dmp

    Filesize

    4KB

  • memory/3668-29-0x00000000005A0000-0x00000000005A1000-memory.dmp

    Filesize

    4KB

  • memory/3668-20-0x0000000002300000-0x0000000002301000-memory.dmp

    Filesize

    4KB

  • memory/3668-19-0x0000000002480000-0x0000000002481000-memory.dmp

    Filesize

    4KB

  • memory/3668-18-0x0000000002340000-0x0000000002341000-memory.dmp

    Filesize

    4KB

  • memory/3668-17-0x0000000002350000-0x0000000002351000-memory.dmp

    Filesize

    4KB

  • memory/3668-16-0x00000000022E0000-0x00000000022E1000-memory.dmp

    Filesize

    4KB

  • memory/3668-15-0x00000000022F0000-0x00000000022F1000-memory.dmp

    Filesize

    4KB

  • memory/3668-24-0x00000000024A0000-0x00000000024A1000-memory.dmp

    Filesize

    4KB

  • memory/3668-0-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/3668-6-0x00000000021D0000-0x00000000021D1000-memory.dmp

    Filesize

    4KB

  • memory/3668-11-0x00000000033E0000-0x00000000033E2000-memory.dmp

    Filesize

    8KB

  • memory/3668-10-0x00000000022C0000-0x00000000022C1000-memory.dmp

    Filesize

    4KB

  • memory/3668-9-0x00000000033F0000-0x00000000033F1000-memory.dmp

    Filesize

    4KB

  • memory/3668-13-0x0000000002310000-0x0000000002311000-memory.dmp

    Filesize

    4KB

  • memory/3668-7-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/3668-12-0x0000000002330000-0x0000000002331000-memory.dmp

    Filesize

    4KB

  • memory/3668-5-0x00000000021E0000-0x00000000021E1000-memory.dmp

    Filesize

    4KB

  • memory/3668-4-0x00000000022B0000-0x00000000022B1000-memory.dmp

    Filesize

    4KB

  • memory/3668-3-0x0000000002200000-0x0000000002201000-memory.dmp

    Filesize

    4KB

  • memory/3668-2-0x0000000002220000-0x0000000002221000-memory.dmp

    Filesize

    4KB

  • memory/3668-1-0x0000000002230000-0x0000000002284000-memory.dmp

    Filesize

    336KB

  • memory/3668-39-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/3668-40-0x0000000002230000-0x0000000002284000-memory.dmp

    Filesize

    336KB