Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/03/2025, 04:09

General

  • Target

    JaffaCakes118_36a2e68cb135f68e717e40c16126da64.exe

  • Size

    82KB

  • MD5

    36a2e68cb135f68e717e40c16126da64

  • SHA1

    a5a021f67b2f9dd77d2d35c88c7a23e54678d87f

  • SHA256

    825ec7bb16e9df0ac9e1535799ff1b0229b1d3ec0b2731ce9db81070013818fb

  • SHA512

    6b29926b8d503c938698800475fe481c6bba9181f43204a1d18687601b73e91c498d5afb6b064c10338f7bfdf12092d4a6969f25fc0f95aebb3e5c860eac51f6

  • SSDEEP

    1536:xuSHh2Oab+GoRbEAD2SHsvholNOjyFKMy+Jhvs5gqtuG7PrxHfTqrgwmD:nEH+GiEs2SMylNOjyFbxJC5eSPherpmD

Malware Config

Signatures

  • Gh0st RAT payload 5 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_36a2e68cb135f68e717e40c16126da64.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_36a2e68cb135f68e717e40c16126da64.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe
      2⤵
      • Server Software Component: Terminal Services DLL
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:1928
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k "Vwxyab Defghijk Mno"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\windows\SysWOW64\1153353407.dll

    Filesize

    7.0MB

    MD5

    081dfa5f9f8ecbebe8c57337a6f6957a

    SHA1

    18eed9a5980fa29800a11a6c469882280b675c87

    SHA256

    976719b5bff4d1016cacf91dfe3c1b65e4429611bd8aa3a563db22199b536019

    SHA512

    e0645d067e3674b363277277f179d7170670356cfdb819f28d52a094874b2dfde68346baada905f4b0f9f1a3ac50eee8c7ed7000c7e5acbbd41f49b56dc2b753

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe

    Filesize

    64KB

    MD5

    3381a60a13ba8b1ded1ba01d45ef06df

    SHA1

    21ea110c033d20d41656259a053130fef4755d57

    SHA256

    8ee6f24af2357dfa751e4236ee478898432bb5a5e8584529b4aff928ba44b8d5

    SHA512

    8f7698046fe99b82b6c5b0a5e0804e79c781ebbe21fa2a1c042632a8a4b494d2562665ca2a88fd7b26b5093ba9498d0f6417026c23a662ccd450336d446b9544

  • memory/1928-12-0x0000000000020000-0x0000000000031000-memory.dmp

    Filesize

    68KB

  • memory/1928-13-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/1928-17-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2344-4-0x00000000008C0000-0x00000000008D1000-memory.dmp

    Filesize

    68KB