Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 02:10
Behavioral task
behavioral1
Sample
dd7565fbb173424cd438ea44a316b410_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd7565fbb173424cd438ea44a316b410_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd7565fbb173424cd438ea44a316b410_JaffaCakes118.exe
-
Size
112KB
-
MD5
dd7565fbb173424cd438ea44a316b410
-
SHA1
192aaee4cc47787bf7e63a1bdb9e448451e3a7f9
-
SHA256
f0b67e6e8905396d6127aa7ad25f047e2537a7d15fc28207fd4186025411c0bd
-
SHA512
dd7d41a705021515feaaa651b2c2d22168ef7b95be8c11dbb85027b26feb4d5b36eaa81e36e9d91e4c800205c73d4b5077da3fb0c9b9a43197ee1fbfd409794c
-
SSDEEP
3072:KpkSyGG5YgJAZYNfmb4Ujb/BRxZhvpA0RTw3o0C:KpkSyGIYgJAwfk4ipxhR9w3i
Malware Config
Signatures
-
Gh0st RAT payload 7 IoCs
resource yara_rule behavioral2/memory/2900-0-0x0000000000400000-0x000000000041E000-memory.dmp family_gh0strat behavioral2/files/0x0008000000023415-4.dat family_gh0strat behavioral2/memory/2900-6-0x0000000010000000-0x000000001001B000-memory.dmp family_gh0strat behavioral2/files/0x0008000000023418-11.dat family_gh0strat behavioral2/memory/2900-13-0x0000000000400000-0x000000000041E000-memory.dmp family_gh0strat behavioral2/memory/4160-14-0x0000000010000000-0x000000001001B000-memory.dmp family_gh0strat behavioral2/memory/4160-15-0x0000000010000000-0x000000001001B000-memory.dmp family_gh0strat -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys dd7565fbb173424cd438ea44a316b410_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys SVCHOST.EXE -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility360.dll" dd7565fbb173424cd438ea44a316b410_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 4160 SVCHOST.EXE -
Loads dropped DLL 2 IoCs
pid Process 2900 dd7565fbb173424cd438ea44a316b410_JaffaCakes118.exe 4160 SVCHOST.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility360.dll dd7565fbb173424cd438ea44a316b410_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd7565fbb173424cd438ea44a316b410_JaffaCakes118.exe -
Kills process with taskkill 1 IoCs
pid Process 4136 taskkill.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4136 taskkill.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2900 wrote to memory of 4136 2900 dd7565fbb173424cd438ea44a316b410_JaffaCakes118.exe 83 PID 2900 wrote to memory of 4136 2900 dd7565fbb173424cd438ea44a316b410_JaffaCakes118.exe 83 PID 2900 wrote to memory of 4136 2900 dd7565fbb173424cd438ea44a316b410_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd7565fbb173424cd438ea44a316b410_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd7565fbb173424cd438ea44a316b410_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im RSTray.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
C:\Windows\SysWOW64\SVCHOST.EXEC:\Windows\SysWOW64\SVCHOST.EXE -K NETSVCS -s FastUserSwitchingCompatibility1⤵
- Drops file in Drivers directory
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD5f616e0a6155e1c3801cab452ce648529
SHA1509c5e67c90730c192eb209d1ab6c02615b07f12
SHA256cee8b46b4637424205965f6584eb2f3cd0c062112e31b16e696b8674ad5710fe
SHA5125bae5e243d1d8c4e8a335d674ad62676c956b389d0598bd8ffa214d21272da67fac59d81fd7b866d0d20c8217eb0c92df2e4d925cf3f0f793aca3107a5acf99d
-
Filesize
99KB
MD50e059d6a0f3f08082712c2f828ea244b
SHA1c5a5f7e6920333419d9a12e5a209ed57ac64b938
SHA2568d356cfabe2b6a7be6434351d08b243868facd7b32d5950d6bc8b02584bd1d91
SHA5126114c72b0f9d2ad09d97a26466d6250a2c2712f91b116f4125bc1252ce20f14708f63f5691f021fac58e0e25a886d6944b589f16d81e0d1626090e807fcf1b8e