Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
b30a1d543cbde36c5e522939f4b3098d_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
b30a1d543cbde36c5e522939f4b3098d_JaffaCakes118.exe
-
Size
684KB
-
MD5
b30a1d543cbde36c5e522939f4b3098d
-
SHA1
a7878a735a0861dec20abc139475c5719ee9cc65
-
SHA256
9675ee1a8e72899164a142c7d75643617d8093c11b370edf2abec53aefb53d71
-
SHA512
771938d0f4adc3de3036d9d0ba9dcc3927b387d17aa0df3d6843df1571484c4cae1cf5a6f8037f92a8959ee6e48ad2731d4783d354252fa15738cf8ad25466e9
-
SSDEEP
12288:gNNY4w/fuVqa4YYvncgVhfc8ohYEkdfDtvbOk70O7xZCgEUEuB3s7e:gNN2GVqaDYnFohODt6FOdwgEUx3s
Malware Config
Signatures
-
Gh0st RAT payload 6 IoCs
resource yara_rule behavioral2/memory/3692-1-0x0000000000400000-0x000000000070B000-memory.dmp family_gh0strat behavioral2/memory/3692-3-0x0000000000400000-0x000000000070B000-memory.dmp family_gh0strat behavioral2/memory/3692-2-0x0000000000400000-0x000000000070B000-memory.dmp family_gh0strat behavioral2/files/0x0009000000023424-6.dat family_gh0strat behavioral2/files/0x00110000000233d4-15.dat family_gh0strat behavioral2/memory/3692-17-0x0000000000400000-0x000000000070B000-memory.dmp family_gh0strat -
Deletes itself 1 IoCs
pid Process 1292 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 3692 b30a1d543cbde36c5e522939f4b3098d_JaffaCakes118.exe 1292 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Fkqk\Nrmsbhvth.pic b30a1d543cbde36c5e522939f4b3098d_JaffaCakes118.exe File created C:\Program Files (x86)\Fkqk\Nrmsbhvth.pic b30a1d543cbde36c5e522939f4b3098d_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\windows\temp2464400.dll b30a1d543cbde36c5e522939f4b3098d_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b30a1d543cbde36c5e522939f4b3098d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3692 b30a1d543cbde36c5e522939f4b3098d_JaffaCakes118.exe 3692 b30a1d543cbde36c5e522939f4b3098d_JaffaCakes118.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 3692 b30a1d543cbde36c5e522939f4b3098d_JaffaCakes118.exe Token: SeRestorePrivilege 3692 b30a1d543cbde36c5e522939f4b3098d_JaffaCakes118.exe Token: SeBackupPrivilege 3692 b30a1d543cbde36c5e522939f4b3098d_JaffaCakes118.exe Token: SeRestorePrivilege 3692 b30a1d543cbde36c5e522939f4b3098d_JaffaCakes118.exe Token: SeBackupPrivilege 3692 b30a1d543cbde36c5e522939f4b3098d_JaffaCakes118.exe Token: SeRestorePrivilege 3692 b30a1d543cbde36c5e522939f4b3098d_JaffaCakes118.exe Token: SeBackupPrivilege 3692 b30a1d543cbde36c5e522939f4b3098d_JaffaCakes118.exe Token: SeRestorePrivilege 3692 b30a1d543cbde36c5e522939f4b3098d_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b30a1d543cbde36c5e522939f4b3098d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b30a1d543cbde36c5e522939f4b3098d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD5f84e8cba0705034704e9490e9d8e783e
SHA1376ba123edca3bf8e8b051adaf1ea882b731ec61
SHA25633f66528c84e77c9d04c10a2053f07bb5fd4c0bca4035298b449c32833fce21e
SHA512b04a9023904a92a0df1149e7f0d0438f179ea4d60a8d8e3c0aafa09de2bbee7969d75ac21081df42393242d0189ea4cc7a4062a1f953f34ee748549180ca8448
-
Filesize
111B
MD515d1ee73ae7f2b635a5247c919e816ca
SHA1e4ee0289825842a9675e240544a575be759fcbe8
SHA256bf16369607fe790b4f22185de433a4362d5c89b5f9f4a34ef9eccd2ed104fc1a
SHA512b1ba961ac35733bcf92563b7bffd081e539fdad36d740ee699b17a4634fe198d2533276bdecf30cd20134c7bf37d980ea044a7712b30b210323fa87c7e4abd65
-
Filesize
2.7MB
MD5915cf6156020268694a48e6db1008205
SHA1166f7330eaf968304f3818557471bec41485a65e
SHA2566dc4d3900d39e6297ea0b15c7f00410da2a987e3e78ba4df485014dbc4832a70
SHA512ec6d2f6e3d219e9dda4a3af05bdd2eb1ef7033e6822b188b1f7a832e98906905aa20ea288f3a3044cd09736d47b3c1b526336e1aead0d0a6f0dc560bdeca65df