Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 12:11

General

  • Target

    960cc2e9dfc91cd09dc11a458eee2796_JaffaCakes118.exe

  • Size

    96KB

  • MD5

    960cc2e9dfc91cd09dc11a458eee2796

  • SHA1

    e64c2bfb409a7af9b8544ea392d45ef53c6e9c1c

  • SHA256

    4b850978d0dd91f2e23a7dd125b94c45af3cac42c45943e1adbce9bf448627dc

  • SHA512

    79958161accb75bcaa0578307ce769741493bb582800fc1ebf4b2aefbf557c4d8158349a90e078d99cdbb68758ab38283d8b8e7711f975d2c5f11c277c7af476

  • SSDEEP

    1536:BAFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8pru8jmyDK:ByS4jHS8q/3nTzePCwNUh4E9u8jmyW

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\960cc2e9dfc91cd09dc11a458eee2796_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\960cc2e9dfc91cd09dc11a458eee2796_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1496
    • \??\c:\users\admin\appdata\local\ctuxkrwkdj
      "C:\Users\Admin\AppData\Local\Temp\960cc2e9dfc91cd09dc11a458eee2796_JaffaCakes118.exe" a -sc:\users\admin\appdata\local\temp\960cc2e9dfc91cd09dc11a458eee2796_jaffacakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2408
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\programdata\application data\storm\update\%sessionname%\yychh.cc3

    Filesize

    19.0MB

    MD5

    6406ee9bc0fcfba53e27c7997c5f5284

    SHA1

    5b78c2f8f3e52eaf74f3dabaf83729208c4e8e43

    SHA256

    64b24e691425bc5d1a5123fd05809573349116e36282a5fa61515fff66e07ebb

    SHA512

    16bb2bd4329e605fd9ef0ba1da4318193987de802f88d8bcba4373169bc9ea8491ddacc8e28c3100a015bd686efc19a05416b1521c6aa312cc6a2ae0f3884fd9

  • \Users\Admin\AppData\Local\ctuxkrwkdj

    Filesize

    23.1MB

    MD5

    9f939199f3210b347bccd269a5e616be

    SHA1

    a2738b23c7fcef7fab0de0849cf95ef40c1e3c4e

    SHA256

    32f758228c22449ca4f2e9945e9b529ae324d0e06fbb4697de8fcc33c887bdf7

    SHA512

    b8dce9b2414bdd432fb914e1e923777fe4d7767d76fc0ab9d55421707c2d3dcea5a7fad4db4da9f7cda3d652842bb1e2d668215569b401b9aeb8c5534d9d6add

  • memory/1496-0-0x0000000000400000-0x000000000044E464-memory.dmp

    Filesize

    313KB

  • memory/1496-2-0x00000000001C0000-0x000000000020F000-memory.dmp

    Filesize

    316KB

  • memory/1496-3-0x00000000001C0000-0x000000000020F000-memory.dmp

    Filesize

    316KB

  • memory/1496-11-0x0000000000400000-0x000000000044E464-memory.dmp

    Filesize

    313KB

  • memory/2408-12-0x0000000000400000-0x000000000044E464-memory.dmp

    Filesize

    313KB

  • memory/2408-20-0x0000000000400000-0x000000000044E464-memory.dmp

    Filesize

    313KB

  • memory/2936-21-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2936-22-0x0000000020000000-0x0000000020027000-memory.dmp

    Filesize

    156KB