Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
28/02/2025, 05:33
Behavioral task
behavioral1
Sample
JaffaCakes118_31ed8ac43646906c48a9516719ac9a1f.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_31ed8ac43646906c48a9516719ac9a1f.exe
-
Size
184KB
-
MD5
31ed8ac43646906c48a9516719ac9a1f
-
SHA1
7902a74914bae35cf3259f3e16ee8be2eb5c7ed3
-
SHA256
18696783f2951aa9fc8f6136e5f911a5e6eeac776fc56f7832e80ec85e9247f0
-
SHA512
a8ec1a09324350f92bb6782c9c420876d5b4e16471bbe57c51c3eec7a9de3785d6c8f1f6c47eee06e8115c15a4406400f894562237972bd4150c1303fff795a6
-
SSDEEP
3072:yvUHexyY1tYVvh8Q3aHS4ktdH5lfZbh0tt2/Y4xeIKhYOZLwAe6cQPYo3uJBAyTu:yUSxkayjdZ1ZbWi/vxrK7ZLwzYv3+q
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000d000000015d2a-5.dat family_gh0strat behavioral1/memory/2120-9-0x0000000010000000-0x000000001001E000-memory.dmp family_gh0strat behavioral1/files/0x000b00000001202c-12.dat family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2096 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2096 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\360sd.gif JaffaCakes118_31ed8ac43646906c48a9516719ac9a1f.exe File created C:\Program Files (x86)\Common Files\360sd.gif JaffaCakes118_31ed8ac43646906c48a9516719ac9a1f.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_31ed8ac43646906c48a9516719ac9a1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe 2096 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 2120 JaffaCakes118_31ed8ac43646906c48a9516719ac9a1f.exe Token: SeRestorePrivilege 2120 JaffaCakes118_31ed8ac43646906c48a9516719ac9a1f.exe Token: SeBackupPrivilege 2120 JaffaCakes118_31ed8ac43646906c48a9516719ac9a1f.exe Token: SeRestorePrivilege 2120 JaffaCakes118_31ed8ac43646906c48a9516719ac9a1f.exe Token: SeBackupPrivilege 2120 JaffaCakes118_31ed8ac43646906c48a9516719ac9a1f.exe Token: SeRestorePrivilege 2120 JaffaCakes118_31ed8ac43646906c48a9516719ac9a1f.exe Token: SeBackupPrivilege 2120 JaffaCakes118_31ed8ac43646906c48a9516719ac9a1f.exe Token: SeRestorePrivilege 2120 JaffaCakes118_31ed8ac43646906c48a9516719ac9a1f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31ed8ac43646906c48a9516719ac9a1f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31ed8ac43646906c48a9516719ac9a1f.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD5bb0ea38f8cc26f2181cbfc153c975917
SHA1d0f9e93ab7db34683fa5aaee0894592918ad7f4e
SHA256fb9f718455eda790269e5ef7c49dbff16b4097f78609b7a5ea02d6b03742906d
SHA512b9d3fd96d6226d3038df1d11d00f7e1156b3ad302e7e4dd57f39dc0faf4fd3004379f0819d73ef7d62aa4d858679e20d342f5e06c5095c0310ff4a0e6a6254ce
-
Filesize
8.1MB
MD53e5525fc033111a31c834b4b91a967dc
SHA12dd191d9591ced30298b9457f82cd2528193d10c
SHA25655ea715e2d01707451ce13bd6616470e648320cc6e27bf0aae7cd0ef70a559e4
SHA5122b5f952b0fa138734480c488b395ce6dd77025c1547450455c2c8b19dfa298895b20baa4d3aac4e763661792a541dcc7a0e9bea868b852b846dff5639782e6a0
-
Filesize
99B
MD537ed7b89c3a1591b76973cf60f60ce20
SHA1747ebaa58d9ad135dbbd4c51668fe0f34563d064
SHA256b7fc97f3a04371087a24bc53e9b665d6df2a605fe793e08f8bf7064f25b67bbc
SHA5124c47510753c22e1707fbbcfe99337348633e74c168e7764b4c8a74227e2cb66eff691a756754b24f9468956e85d364e1e7bbd2a6150073a21ec9f256c28f6ba0