Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2025, 01:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4572a395f849eece93bdd2c5071cd717.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4572a395f849eece93bdd2c5071cd717.exe
-
Size
1.4MB
-
MD5
4572a395f849eece93bdd2c5071cd717
-
SHA1
3e0ea31860f37e744e5b5f45ac98fd8c5eb6f36a
-
SHA256
69331281556a9da8b0612655a4570935a3239d7bd6943fd5f8e7753fca4d567a
-
SHA512
4bbc56692b04dbeb54809b582ad0d430901fc7a1d41c32108e392b1172a2f55b79a08074fe15007bbdc4577e8a5b8853b1867e270911cc28892144e7053c66a8
-
SSDEEP
24576:IpQI7mFPNpDTKGGc//////RTrAR+CEJpk2XUFl+TDWhYeqow8ZWR6eMvDR1IBf/A:IH67Ec//////RTEA8dr+Tqrbw8ZtDsN4
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/files/0x000b000000023b83-69.dat family_gh0strat behavioral2/memory/3368-79-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/4256-84-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/1936-90-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
Executes dropped EXE 3 IoCs
pid Process 2760 SRAT.exe 184 alg.exe 1612 jiwmqjugqm -
Loads dropped DLL 3 IoCs
pid Process 3368 svchost.exe 4256 svchost.exe 1936 svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\ybfgaisonl svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\yksailumag svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\yshsqoxjnc svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 1940 3368 WerFault.exe 96 932 4256 WerFault.exe 103 3324 1936 WerFault.exe 107 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jiwmqjugqm Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4572a395f849eece93bdd2c5071cd717.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1612 jiwmqjugqm 1612 jiwmqjugqm -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeRestorePrivilege 1612 jiwmqjugqm Token: SeBackupPrivilege 1612 jiwmqjugqm Token: SeBackupPrivilege 1612 jiwmqjugqm Token: SeRestorePrivilege 1612 jiwmqjugqm Token: SeBackupPrivilege 3368 svchost.exe Token: SeRestorePrivilege 3368 svchost.exe Token: SeBackupPrivilege 3368 svchost.exe Token: SeBackupPrivilege 3368 svchost.exe Token: SeSecurityPrivilege 3368 svchost.exe Token: SeSecurityPrivilege 3368 svchost.exe Token: SeBackupPrivilege 3368 svchost.exe Token: SeBackupPrivilege 3368 svchost.exe Token: SeSecurityPrivilege 3368 svchost.exe Token: SeBackupPrivilege 3368 svchost.exe Token: SeBackupPrivilege 3368 svchost.exe Token: SeSecurityPrivilege 3368 svchost.exe Token: SeBackupPrivilege 3368 svchost.exe Token: SeRestorePrivilege 3368 svchost.exe Token: SeBackupPrivilege 4256 svchost.exe Token: SeRestorePrivilege 4256 svchost.exe Token: SeBackupPrivilege 4256 svchost.exe Token: SeBackupPrivilege 4256 svchost.exe Token: SeSecurityPrivilege 4256 svchost.exe Token: SeSecurityPrivilege 4256 svchost.exe Token: SeBackupPrivilege 4256 svchost.exe Token: SeBackupPrivilege 4256 svchost.exe Token: SeSecurityPrivilege 4256 svchost.exe Token: SeBackupPrivilege 4256 svchost.exe Token: SeBackupPrivilege 4256 svchost.exe Token: SeSecurityPrivilege 4256 svchost.exe Token: SeBackupPrivilege 4256 svchost.exe Token: SeRestorePrivilege 4256 svchost.exe Token: SeBackupPrivilege 1936 svchost.exe Token: SeSecurityPrivilege 1936 svchost.exe Token: SeBackupPrivilege 1936 svchost.exe Token: SeRestorePrivilege 1936 svchost.exe Token: SeSecurityPrivilege 1936 svchost.exe Token: SeBackupPrivilege 1936 svchost.exe Token: SeBackupPrivilege 1936 svchost.exe Token: SeSecurityPrivilege 1936 svchost.exe Token: SeBackupPrivilege 1936 svchost.exe Token: SeBackupPrivilege 1936 svchost.exe Token: SeSecurityPrivilege 1936 svchost.exe Token: SeBackupPrivilege 1936 svchost.exe Token: SeRestorePrivilege 1936 svchost.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2760 SRAT.exe 2760 SRAT.exe 2760 SRAT.exe 2760 SRAT.exe 2760 SRAT.exe 2760 SRAT.exe 2760 SRAT.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2760 SRAT.exe 2760 SRAT.exe 2760 SRAT.exe 2760 SRAT.exe 2760 SRAT.exe 2760 SRAT.exe 2760 SRAT.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3980 wrote to memory of 4116 3980 JaffaCakes118_4572a395f849eece93bdd2c5071cd717.exe 83 PID 3980 wrote to memory of 4116 3980 JaffaCakes118_4572a395f849eece93bdd2c5071cd717.exe 83 PID 3980 wrote to memory of 4116 3980 JaffaCakes118_4572a395f849eece93bdd2c5071cd717.exe 83 PID 3980 wrote to memory of 4044 3980 JaffaCakes118_4572a395f849eece93bdd2c5071cd717.exe 84 PID 3980 wrote to memory of 4044 3980 JaffaCakes118_4572a395f849eece93bdd2c5071cd717.exe 84 PID 3980 wrote to memory of 4044 3980 JaffaCakes118_4572a395f849eece93bdd2c5071cd717.exe 84 PID 4116 wrote to memory of 2760 4116 cmd.exe 87 PID 4116 wrote to memory of 2760 4116 cmd.exe 87 PID 4116 wrote to memory of 2760 4116 cmd.exe 87 PID 4044 wrote to memory of 184 4044 cmd.exe 88 PID 4044 wrote to memory of 184 4044 cmd.exe 88 PID 4044 wrote to memory of 184 4044 cmd.exe 88 PID 184 wrote to memory of 1612 184 alg.exe 89 PID 184 wrote to memory of 1612 184 alg.exe 89 PID 184 wrote to memory of 1612 184 alg.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4572a395f849eece93bdd2c5071cd717.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4572a395f849eece93bdd2c5071cd717.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\SRAT.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\SRAT.exeC:\Users\Admin\AppData\Local\Temp\SRAT.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2760
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\alg.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\alg.exeC:\Users\Admin\AppData\Local\Temp\alg.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:184 -
\??\c:\users\admin\appdata\local\jiwmqjugqmC:\Users\Admin\AppData\Local\Temp\alg.exe a -sc:\users\admin\appdata\local\temp\alg.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3368 -s 7842⤵
- Program crash
PID:1940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3368 -ip 33681⤵PID:64
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 9202⤵
- Program crash
PID:932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4256 -ip 42561⤵PID:4340
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 8722⤵
- Program crash
PID:3324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1936 -ip 19361⤵PID:1400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
814KB
MD59a62b1378200e4a8cc45025c89be17c0
SHA19891eadf9507d4e47b5e76cd9073743e0d06a76e
SHA2563ce7cf1e6af93d9c82365a7f8c475c5e0484c128f1e09b33ceb716ee3ddcc1f5
SHA512c784679063d24dc0a79ab6882ad009fd23f4fb9e36bdb429fd8a2fbd76a4a4e9ce7ab4f06267d8e1cba7f326ce406595f9ada479cc500382cb6f93ae3a9e87ba
-
Filesize
24B
MD5492895398b228836f7c2c07040204c54
SHA18a15c9b02004f8f6dc743a53662195ff412ca60e
SHA256f9e2b9858b78338c6a8e4fc98938807999c8d129f9f77324019372cd73ba9df0
SHA512669372adef804ee4260e676b3ae76f5e573f7079f3cf36bb841b26abf4963d0b060c79df98f3722c7d2ec585fa0cb3e6f0feeff4bbf4bd622759c1fb63584ccc
-
Filesize
196KB
MD52f74f888d3305020b1786b606346848f
SHA1352549b244057ec31e0295d180b76935704d61eb
SHA256d79679f87d6ac990d5b3f276ba6edc9f30f15c52dccf5c1f3e63de8889d4ee77
SHA5121a18344bbe1d0c962b0cfb7a1559b30cc6fc5e5818fb8e8c84dc76048d6947a29e1696c7d6c35f0bc5a70f43722b87d7204901e96b5b636504851bf7e5cfc9c6
-
Filesize
22.9MB
MD52d8ec79429cbca4f8db7e68c0660440d
SHA1a4de62fcc1566804b64bbe747212ab1daae0972f
SHA25626ff836aa073f276ecee1198ca17e89dc18ead0847765fe01d19a33ec0700499
SHA512ebc9578e0b6cca014f390ead648c661cb78014237313f3d7099c217a4d7621eabce8e1af00172048c9a1a98d4bb9391c3911d50a911fff4b9717992879bcef6f
-
Filesize
202B
MD5900affa2b455af632d8d483d16a40ab8
SHA1ea07873e6d3ff0c274d506b4aa5fd6f09a5d0ee0
SHA256cebccd4f9e998933f2855c7a263665047efcd36044acc54ad18b88b0e0380a7a
SHA512210c529f4e734d6ae25e100d138f7517c7e8af838bd0df0a704fa58b10fdfb11f71b0aa15d1a24bc3ee76c1f1fa22aa727103c18bcd6d0100fcfe96a7cd37f95
-
Filesize
303B
MD5c135d192d12fa2f3b606f855ca536433
SHA1ba5e760d614805d8f32709210031cb6988e10531
SHA2564de229689b8ced6a2a910d78a7db2154684854244c5d58be72df4606c04bf3a3
SHA5125596f969cb17fccfdbaa6b213059577c247492725346bca5bf456c526ef5ea8bfa4486ca83423a32c76551ddcfd03c02a92bbaa4bf13ac39a497ff925cb10551
-
Filesize
24.0MB
MD5241ecb260c885efa8d045157ca86b693
SHA1fcad129725f91c4187d9c406cc0203e6f9aaef00
SHA25658f99092eae28f755739203dedc0e3054af3170d20565564e581f7774b91edae
SHA5127dcd10c96c21785b60adef2d2c84b6a0e5f5456e6997af35a0354622c7169fac9651889af41aa0816105686d29bfc0f3ee672c6b766440067606e227cf5dc77b