Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 01:10

General

  • Target

    54a7b338df1154e20512b64ad2661be7_JaffaCakes118.exe

  • Size

    113KB

  • MD5

    54a7b338df1154e20512b64ad2661be7

  • SHA1

    72658228b4e1ed61b6fff27988945b1680344607

  • SHA256

    c9cbb19718bef0f24375c762f6dd422380190718650c802e22a57447f48f1984

  • SHA512

    41c99d5eff7bf4f514c59fd84ba03f3689e14cf6860c2d0c8c99575ac6cb5d2ebb899f412021d85f3a43469c6970fe80a1eda842b026833786b7eb420cb9a58b

  • SSDEEP

    3072:dmxsSZBYIknpgVglmuVHWhp+hN6L5I+KTCi:dmxsS71knpjYKW7INW5I+Km

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54a7b338df1154e20512b64ad2661be7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\54a7b338df1154e20512b64ad2661be7_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:3076
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:1424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\windows\SysWOW64\fastuserswitchingcompatibilitymon.dll

    Filesize

    103KB

    MD5

    1d05674d10068bf5f0cfd8ae539b47f5

    SHA1

    c9d8138659e4b8a91572c7999d8712b95dc7ff41

    SHA256

    7b330af250934090c1c4ff8d87ac6af51998723475a2dbcdae423455385a94a0

    SHA512

    f13eea5ab852672bb99875a8929894514b8221d8aa8c269ad7ab478eda65a4502d6d31a3be56f7f2a0cc9f5afc4f1c9e1062205804e5bf0451a11b168d03fecc

  • memory/3076-0-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/3076-5-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB