Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/02/2025, 04:30
Behavioral task
behavioral1
Sample
JaffaCakes118_31964dfdd7e07e2193e2e1476a64b755.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_31964dfdd7e07e2193e2e1476a64b755.exe
-
Size
136KB
-
MD5
31964dfdd7e07e2193e2e1476a64b755
-
SHA1
fc26d0420fa5abbf8389a3a565e00f6b501b1389
-
SHA256
506bb631d0cddd36b722c2bd5c4e1ada1d73f9e3d2258d55225094dadb83487a
-
SHA512
8f99b71ab81763ecb251fc72ba04c1365437a1aa270f5026f1888887877e7ea381086e2ab114d2d4d92c1366ef93f99dd5870eb5e269e352780978ae3cc3121e
-
SSDEEP
3072:s5xufj+3Ok4yewwA1ZuovQX+I+6gbPfPiHkoBnGkypCwSR3apG+:4RxABOI+FTPMZnGkykwMX+
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000c00000001225c-5.dat family_gh0strat behavioral1/files/0x0004000000004ed7-10.dat family_gh0strat behavioral1/memory/2344-14-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2444 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2444 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Pwyj\Enwhnhfhs.bmp JaffaCakes118_31964dfdd7e07e2193e2e1476a64b755.exe File created C:\Program Files (x86)\Pwyj\Enwhnhfhs.bmp JaffaCakes118_31964dfdd7e07e2193e2e1476a64b755.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_31964dfdd7e07e2193e2e1476a64b755.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2344 JaffaCakes118_31964dfdd7e07e2193e2e1476a64b755.exe 2344 JaffaCakes118_31964dfdd7e07e2193e2e1476a64b755.exe 2344 JaffaCakes118_31964dfdd7e07e2193e2e1476a64b755.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2344 JaffaCakes118_31964dfdd7e07e2193e2e1476a64b755.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 2344 JaffaCakes118_31964dfdd7e07e2193e2e1476a64b755.exe Token: SeRestorePrivilege 2344 JaffaCakes118_31964dfdd7e07e2193e2e1476a64b755.exe Token: SeBackupPrivilege 2344 JaffaCakes118_31964dfdd7e07e2193e2e1476a64b755.exe Token: SeRestorePrivilege 2344 JaffaCakes118_31964dfdd7e07e2193e2e1476a64b755.exe Token: SeBackupPrivilege 2344 JaffaCakes118_31964dfdd7e07e2193e2e1476a64b755.exe Token: SeRestorePrivilege 2344 JaffaCakes118_31964dfdd7e07e2193e2e1476a64b755.exe Token: SeBackupPrivilege 2344 JaffaCakes118_31964dfdd7e07e2193e2e1476a64b755.exe Token: SeRestorePrivilege 2344 JaffaCakes118_31964dfdd7e07e2193e2e1476a64b755.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31964dfdd7e07e2193e2e1476a64b755.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31964dfdd7e07e2193e2e1476a64b755.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD52c6fad20eacceaf3d7e3e532e5986e32
SHA13a353942f94834cba25227ec4bf0e88617561b08
SHA25628e07be656059d7e08cba40e5c1961afb52459b6de5b1294b5b9031d3a598bd6
SHA512717f386285c48a439bc5d112f8afc78b41c326fa0075e01e3f530be266506c47efa53348535d8e0b71243efcb2c5b20eb6c18488d31f980e1303338ea5f40cd9
-
Filesize
99B
MD56ecbca4216cb5dddbbb6d12a8c3032cc
SHA13b53275871f09bd0f537b3975bcca75496a313f9
SHA256d32aeaa63370a76f482401ed2b6872fd86f7830dc72e80292dc08cbc859afee5
SHA5122060ae67dd6e98a497e4f2de7d24c1dd75141c0be3a5ca27decbc9120ae7e4f2fdb6095345b5c1750947d6e5bb1aa6e259c6c99a51d4ec3ce305b1e38fa2f2b2
-
Filesize
4.4MB
MD569a86ffce6c92ef3454a2c57f121786e
SHA1d7a110c95812d94f5c33a173494e61e5137ed2b0
SHA256e015131756bb754225247392b86073951b965c4f78cd3ce404e41b5db2a5e839
SHA512ebec0cc638d15612fc98bb4ec845af9db4ead21d80e4de2b701b6694aa4b59610fa3e8b3ee6e80354c20058d0297e12ac621807be1fa6964d72c1b20745f013c