Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
04fb1f52568c65c6d033cf2c518f1261_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04fb1f52568c65c6d033cf2c518f1261_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
04fb1f52568c65c6d033cf2c518f1261_JaffaCakes118.exe
-
Size
216KB
-
MD5
04fb1f52568c65c6d033cf2c518f1261
-
SHA1
eb72be1e4db9b307f87989182fae6700dd9f7a78
-
SHA256
5ec414a67742ca49ffa8b710295e643dcb01e348c1b40515033613113f20e5ff
-
SHA512
526b3e04d20c9a33f545d1c02244e3b9aaccf72bbfa461c6fddddda1a97858041e00dfa5ef7914db92226d8c30cb7c8f482ba65d36a0821c5e7805322012ce04
-
SSDEEP
3072:0VQZytihuXq2eobs76FkkvtpOqRnupBT8V1+Uc6uQ:vZoqXoc9WtFRupBT8V1+9fQ
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/3760-0-0x0000000010000000-0x0000000010034000-memory.dmp family_gh0strat behavioral2/memory/232-8-0x0000000010000000-0x0000000010034000-memory.dmp family_gh0strat behavioral2/memory/4432-13-0x0000000010000000-0x0000000010034000-memory.dmp family_gh0strat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 04fb1f52568c65c6d033cf2c518f1261_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 232 atiecls.exe 4432 atiecls.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\atiecls.exe 04fb1f52568c65c6d033cf2c518f1261_JaffaCakes118.exe File opened for modification C:\Windows\atiecls.exe 04fb1f52568c65c6d033cf2c518f1261_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04fb1f52568c65c6d033cf2c518f1261_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language atiecls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language atiecls.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3760 04fb1f52568c65c6d033cf2c518f1261_JaffaCakes118.exe 3760 04fb1f52568c65c6d033cf2c518f1261_JaffaCakes118.exe 232 atiecls.exe 232 atiecls.exe 4432 atiecls.exe 4432 atiecls.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3760 04fb1f52568c65c6d033cf2c518f1261_JaffaCakes118.exe Token: SeDebugPrivilege 232 atiecls.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3760 wrote to memory of 5116 3760 04fb1f52568c65c6d033cf2c518f1261_JaffaCakes118.exe 83 PID 3760 wrote to memory of 5116 3760 04fb1f52568c65c6d033cf2c518f1261_JaffaCakes118.exe 83 PID 3760 wrote to memory of 5116 3760 04fb1f52568c65c6d033cf2c518f1261_JaffaCakes118.exe 83 PID 232 wrote to memory of 4432 232 atiecls.exe 85 PID 232 wrote to memory of 4432 232 atiecls.exe 85 PID 232 wrote to memory of 4432 232 atiecls.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\04fb1f52568c65c6d033cf2c518f1261_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04fb1f52568c65c6d033cf2c518f1261_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\04FB1F~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:5116
-
-
C:\Windows\atiecls.exeC:\Windows\atiecls.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\atiecls.exeC:\Windows\atiecls.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4432
-