Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 12:38 UTC

General

  • Target

    a28fea64630c9be2bd9c0e4ecc8abe91_JaffaCakes118.exe

  • Size

    384KB

  • MD5

    a28fea64630c9be2bd9c0e4ecc8abe91

  • SHA1

    777e5ffd98706cbdd9aa1d40f5ad34dc8df8e8dc

  • SHA256

    b3f4143381141c86942012898ad26ee8b495d8567471bf8322259d9612c6b240

  • SHA512

    9ce00dce9940876f92cefc20135c21ff0f948d5e605006c1b8754ddd3198fa710638fd32196434a9c1da79b2f5d9751249d839e2f32257920392ac5323273d99

  • SSDEEP

    12288:KPdK4bgeK8VL5TKjb31wgxllhz7G60i2qvyOt:KPBjK8VlYb3P9FZ

Malware Config

Signatures

  • Gh0st RAT payload 13 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a28fea64630c9be2bd9c0e4ecc8abe91_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a28fea64630c9be2bd9c0e4ecc8abe91_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2256
    • \??\c:\Windows\svchest000.exe
      c:\Windows\svchest000.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2776

Network

  • flag-us
    DNS
    aa0533.3322.org
    a28fea64630c9be2bd9c0e4ecc8abe91_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    aa0533.3322.org
    IN A
    Response
No results found
  • 8.8.8.8:53
    aa0533.3322.org
    dns
    a28fea64630c9be2bd9c0e4ecc8abe91_JaffaCakes118.exe
    61 B
    125 B
    1
    1

    DNS Request

    aa0533.3322.org

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchest000.exe

    Filesize

    384KB

    MD5

    a28fea64630c9be2bd9c0e4ecc8abe91

    SHA1

    777e5ffd98706cbdd9aa1d40f5ad34dc8df8e8dc

    SHA256

    b3f4143381141c86942012898ad26ee8b495d8567471bf8322259d9612c6b240

    SHA512

    9ce00dce9940876f92cefc20135c21ff0f948d5e605006c1b8754ddd3198fa710638fd32196434a9c1da79b2f5d9751249d839e2f32257920392ac5323273d99

  • memory/2256-3-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2256-10-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2256-9-0x0000000000401000-0x0000000000468000-memory.dmp

    Filesize

    412KB

  • memory/2256-7-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2256-6-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2256-5-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2256-2-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2256-4-0x0000000000280000-0x0000000000282000-memory.dmp

    Filesize

    8KB

  • memory/2256-8-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2256-17-0x0000000002590000-0x00000000026DE000-memory.dmp

    Filesize

    1.3MB

  • memory/2256-1-0x0000000000230000-0x000000000026E000-memory.dmp

    Filesize

    248KB

  • memory/2256-35-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2256-34-0x0000000002590000-0x00000000026DE000-memory.dmp

    Filesize

    1.3MB

  • memory/2256-0-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2256-30-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2256-33-0x0000000000230000-0x000000000026E000-memory.dmp

    Filesize

    248KB

  • memory/2776-28-0x00000000001D0000-0x000000000020E000-memory.dmp

    Filesize

    248KB

  • memory/2776-26-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2776-25-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2776-24-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2776-23-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2776-22-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2776-20-0x00000000001D0000-0x000000000020E000-memory.dmp

    Filesize

    248KB

  • memory/2776-27-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2776-29-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2776-21-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2776-18-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.