Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    107s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/02/2025, 05:40

General

  • Target

    JaffaCakes118_31f4ee37705aa6d03627013abf5c3300.exe

  • Size

    96KB

  • MD5

    31f4ee37705aa6d03627013abf5c3300

  • SHA1

    c53d67f906a9a742f6930aaadc3661d0cfc02b92

  • SHA256

    0feeff3ab680deabf6e3583c553cb83647113182e0f0cd64860955e2e510ed62

  • SHA512

    efde74b2e2045c1d5bb10f27b870d85e11e5c74811245feec7a8549f3f2a776c6cb21b6737b7131bc2b9bb4a5de6f6f42617702caf2e20ecd8075d5cebb399fc

  • SSDEEP

    1536:7QFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8proyLClEoPHEY42CpLj:7iS4jHS8q/3nTzePCwNUh4E9o+0PHEBj

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 5 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 6 IoCs
  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31f4ee37705aa6d03627013abf5c3300.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31f4ee37705aa6d03627013abf5c3300.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:716
    • \??\c:\users\admin\appdata\local\erhwlcyjog
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31f4ee37705aa6d03627013abf5c3300.exe" a -sc:\users\admin\appdata\local\temp\jaffacakes118_31f4ee37705aa6d03627013abf5c3300.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5048
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:1164
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 1020
      2⤵
      • Program crash
      PID:448
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1164 -ip 1164
    1⤵
      PID:1736
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility
      1⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3432
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 872
        2⤵
        • Program crash
        PID:116
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3432 -ip 3432
      1⤵
        PID:1760
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility
        1⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2520
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 1052
          2⤵
          • Program crash
          PID:1340
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2520 -ip 2520
        1⤵
          PID:644

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\svchost.exe.txt

          Filesize

          202B

          MD5

          d5e4020d048f3c41d97a308bff8142a2

          SHA1

          6c28631d14282243360e3725bc1d52c4c3393da4

          SHA256

          1e45ac36a8f1382885fee9c8c5561b74f6d0dd1ea065f4441fef7bc267580da0

          SHA512

          c02a4c7a30163ecb38acf32bd82ef0f59299eb38db8dfca00680848f357c3527c17b342813de340bceffff99b7e0d3cd8e5e65ba76c3c34cb7a46df625c1ab8f

        • C:\Windows\SysWOW64\svchost.exe.txt

          Filesize

          303B

          MD5

          0f19fefcd62ec2718f70c10bc1968662

          SHA1

          1dee0a88f147081bb6584e1226b20c7b210c308e

          SHA256

          14476c046339a48306eabfd1822262e3c43ae8401448f3693867ece0b945672f

          SHA512

          6583971e881008a6c0f5b3daa3d495211108110fccf63522799052e68e5245f48d7daf0aa8150c5682ed3b73a2d9a7fe35380c9a9ec295567f9eaf89bf18cda9

        • \??\c:\programdata\application data\storm\update\%sessionname%\oossf.cc3

          Filesize

          24.1MB

          MD5

          414c01ddb9032f260bc0383d0050ca19

          SHA1

          bd24636a6ed3ba40fddf83a759c17aab924f803d

          SHA256

          1abe6ad826eb8edd5b160266bd4917d9bba996b733449550b6a612529fb3391d

          SHA512

          b0f3c8536e8ea6ebd1e50d08a6a06ac8f8d5f954f99a9353b30c5a3fbf6f4a359710fc09419f1e5bc8de3717f7df4339a0835c7f9186cbeecbbb5438e486e6c1

        • \??\c:\users\admin\appdata\local\erhwlcyjog

          Filesize

          23.9MB

          MD5

          62b4655091fe7b1bcdf991a7dc42dd99

          SHA1

          9c769bffc55fcf4cfc9a4f7c0db66496bd6d2611

          SHA256

          10afac8b66214393af6f43fb09eedf718f3933ffece835499a69b75cd37fa886

          SHA512

          9af676c97c3582e96bc9f774e1a5f43fbaacfa1b6cfc2f170b4ca4dfbec17dfedb9782958824811f33f8c1f16082d850850b7efdcb62ed95f1ede785e3c2a5bb

        • memory/716-2-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/716-7-0x0000000000400000-0x000000000044E31C-memory.dmp

          Filesize

          312KB

        • memory/716-0-0x0000000000400000-0x000000000044E31C-memory.dmp

          Filesize

          312KB

        • memory/1164-18-0x0000000000EF0000-0x0000000000EF1000-memory.dmp

          Filesize

          4KB

        • memory/1164-20-0x0000000020000000-0x0000000020027000-memory.dmp

          Filesize

          156KB

        • memory/2520-30-0x0000000020000000-0x0000000020027000-memory.dmp

          Filesize

          156KB

        • memory/2520-27-0x00000000019E0000-0x00000000019E1000-memory.dmp

          Filesize

          4KB

        • memory/3432-25-0x0000000020000000-0x0000000020027000-memory.dmp

          Filesize

          156KB

        • memory/3432-22-0x0000000000F00000-0x0000000000F01000-memory.dmp

          Filesize

          4KB

        • memory/5048-17-0x0000000000400000-0x000000000044E31C-memory.dmp

          Filesize

          312KB

        • memory/5048-8-0x0000000000400000-0x000000000044E31C-memory.dmp

          Filesize

          312KB

        • memory/5048-11-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB