Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/02/2025, 23:32
Behavioral task
behavioral1
Sample
JaffaCakes118_35488d47c90abce38e4b6af5851ea660.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_35488d47c90abce38e4b6af5851ea660.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_35488d47c90abce38e4b6af5851ea660.exe
-
Size
96KB
-
MD5
35488d47c90abce38e4b6af5851ea660
-
SHA1
728e80da6301ff406565286680191033ab4fbead
-
SHA256
332ee3eff68305532c352859772e36b6693a483bb2e1a46f0aee46b816e1eb49
-
SHA512
9707dfc1fbf016a8b64eab8c0e1c29a89346ae3fbe9ee6c4200b810640d34d12fa046656a24212d0c98b72221ada885f87af12d28abd2ee4de98d470a1851499
-
SSDEEP
1536:C2aWii8VlzGOU/PYbQF99d1HB5O43kx+AEn2vl7cHQkGcm+GOLOBpbQ54wytbJ/3:GPzRlC9pW43k02vlmTt6BpbQ54wYb0A
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2004-0-0x0000000000400000-0x000000000041A000-memory.dmp family_gh0strat behavioral1/files/0x0007000000012117-5.dat family_gh0strat behavioral1/memory/2004-6-0x0000000000400000-0x000000000041A000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\M23\Parameters\ServiceDll = "C:\\Windows\\system32\\259434498.dll" JaffaCakes118_35488d47c90abce38e4b6af5851ea660.exe -
Loads dropped DLL 1 IoCs
pid Process 3024 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\259434498.dll JaffaCakes118_35488d47c90abce38e4b6af5851ea660.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2032 3024 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_35488d47c90abce38e4b6af5851ea660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2032 3024 svchost.exe 31 PID 3024 wrote to memory of 2032 3024 svchost.exe 31 PID 3024 wrote to memory of 2032 3024 svchost.exe 31 PID 3024 wrote to memory of 2032 3024 svchost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_35488d47c90abce38e4b6af5851ea660.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_35488d47c90abce38e4b6af5851ea660.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2004
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 2442⤵
- Program crash
PID:2032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.1MB
MD505dbe2e12a894b5c662500bcc09b12b8
SHA109c225b9e5b7ebb8f429e98de4fb61752add7419
SHA256ffb5211293067ea1aff91e3e92410afd34836fa9373d067b5a80b46e7b25bb66
SHA5127deea11652bb1ede203ab0b41778c50960bed864c3c806a64596e98e4345e25522d483f17c749a663a77b8a63cf4982a90ae06c4e930b5f9958af22ee245e51e