Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 17:07
Behavioral task
behavioral1
Sample
a3662122e372cf1ad59a53c22884f27d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a3662122e372cf1ad59a53c22884f27d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a3662122e372cf1ad59a53c22884f27d_JaffaCakes118.exe
-
Size
109KB
-
MD5
a3662122e372cf1ad59a53c22884f27d
-
SHA1
a5c14979b2f82d6d503c090a11720a0f3a666358
-
SHA256
43edd337b327b778969c87077e53d104802ea86ae30f34368d51f31d45aab06c
-
SHA512
578feb3e0a5986aeb183bbd9108c6ca35479ca567ad61a4235d0bca3843c1ff2abf26780355264fdcb433fde042d00c48eebb1c15db0e75951be6640fc9ecab5
-
SSDEEP
3072:O5+qt6yawwjQG0XuKJwVS7MOW76OrfCr70vUaHI:O4qt6yawwjQG4n0SpFODCrEUaHI
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral1/memory/948-0-0x0000000000400000-0x000000000041D000-memory.dmp family_gh0strat behavioral1/files/0x000b000000016cc3-2.dat family_gh0strat behavioral1/memory/2184-5-0x0000000010000000-0x000000001001A000-memory.dmp family_gh0strat behavioral1/memory/948-3-0x0000000000400000-0x000000000041D000-memory.dmp family_gh0strat behavioral1/memory/2184-6-0x0000000010000000-0x000000001001A000-memory.dmp family_gh0strat -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Documents and Settings\\Local User\\twain.dll" a3662122e372cf1ad59a53c22884f27d_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2184 SVCHOST.EXE -
Loads dropped DLL 1 IoCs
pid Process 2184 SVCHOST.EXE -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3662122e372cf1ad59a53c22884f27d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 948 a3662122e372cf1ad59a53c22884f27d_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 948 a3662122e372cf1ad59a53c22884f27d_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3662122e372cf1ad59a53c22884f27d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3662122e372cf1ad59a53c22884f27d_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:948
-
C:\Windows\SysWOW64\SVCHOST.EXEC:\Windows\SysWOW64\SVCHOST.EXE -K NETSVCS1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5514103682e7fbdcae717cd17ccd5ba34
SHA125c35b59c1de7215439720dddcb49977d454eefb
SHA256515e9cd3ee5cffad350bbe8e3e0b8a2c83a103393906f92cf4982719af597401
SHA512de3ecd67be421d6d0709e825963f3176f0b56777da22675922eb9a76a2d2e8804d48e85b93a2f311fd0fe9c6861a6ef61958de80aacd62101fae1fd85b334052