Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_36a2e68cb135f68e717e40c16126da64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_36a2e68cb135f68e717e40c16126da64.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_36a2e68cb135f68e717e40c16126da64.exe
-
Size
82KB
-
MD5
36a2e68cb135f68e717e40c16126da64
-
SHA1
a5a021f67b2f9dd77d2d35c88c7a23e54678d87f
-
SHA256
825ec7bb16e9df0ac9e1535799ff1b0229b1d3ec0b2731ce9db81070013818fb
-
SHA512
6b29926b8d503c938698800475fe481c6bba9181f43204a1d18687601b73e91c498d5afb6b064c10338f7bfdf12092d4a6969f25fc0f95aebb3e5c860eac51f6
-
SSDEEP
1536:xuSHh2Oab+GoRbEAD2SHsvholNOjyFKMy+Jhvs5gqtuG7PrxHfTqrgwmD:nEH+GiEs2SMylNOjyFbxJC5eSPherpmD
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral1/memory/2344-4-0x00000000008C0000-0x00000000008D1000-memory.dmp family_gh0strat behavioral1/files/0x0009000000016d3e-2.dat family_gh0strat behavioral1/memory/1928-12-0x0000000000020000-0x0000000000031000-memory.dmp family_gh0strat behavioral1/files/0x0008000000016d46-15.dat family_gh0strat behavioral1/memory/1928-17-0x0000000000400000-0x0000000000411000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Vwxyab Defghijk Mno\Parameters\ServiceDll = "C:\\Windows\\system32\\1153353407.dll" 1.exe -
Executes dropped EXE 1 IoCs
pid Process 1928 1.exe -
Loads dropped DLL 4 IoCs
pid Process 2344 JaffaCakes118_36a2e68cb135f68e717e40c16126da64.exe 2344 JaffaCakes118_36a2e68cb135f68e717e40c16126da64.exe 1928 1.exe 2500 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JaffaCakes118_36a2e68cb135f68e717e40c16126da64.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\1153353407.dll 1.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_36a2e68cb135f68e717e40c16126da64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1928 2344 JaffaCakes118_36a2e68cb135f68e717e40c16126da64.exe 30 PID 2344 wrote to memory of 1928 2344 JaffaCakes118_36a2e68cb135f68e717e40c16126da64.exe 30 PID 2344 wrote to memory of 1928 2344 JaffaCakes118_36a2e68cb135f68e717e40c16126da64.exe 30 PID 2344 wrote to memory of 1928 2344 JaffaCakes118_36a2e68cb135f68e717e40c16126da64.exe 30 PID 2344 wrote to memory of 1928 2344 JaffaCakes118_36a2e68cb135f68e717e40c16126da64.exe 30 PID 2344 wrote to memory of 1928 2344 JaffaCakes118_36a2e68cb135f68e717e40c16126da64.exe 30 PID 2344 wrote to memory of 1928 2344 JaffaCakes118_36a2e68cb135f68e717e40c16126da64.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_36a2e68cb135f68e717e40c16126da64.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_36a2e68cb135f68e717e40c16126da64.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1928
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Vwxyab Defghijk Mno"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD5081dfa5f9f8ecbebe8c57337a6f6957a
SHA118eed9a5980fa29800a11a6c469882280b675c87
SHA256976719b5bff4d1016cacf91dfe3c1b65e4429611bd8aa3a563db22199b536019
SHA512e0645d067e3674b363277277f179d7170670356cfdb819f28d52a094874b2dfde68346baada905f4b0f9f1a3ac50eee8c7ed7000c7e5acbbd41f49b56dc2b753
-
Filesize
64KB
MD53381a60a13ba8b1ded1ba01d45ef06df
SHA121ea110c033d20d41656259a053130fef4755d57
SHA2568ee6f24af2357dfa751e4236ee478898432bb5a5e8584529b4aff928ba44b8d5
SHA5128f7698046fe99b82b6c5b0a5e0804e79c781ebbe21fa2a1c042632a8a4b494d2562665ca2a88fd7b26b5093ba9498d0f6417026c23a662ccd450336d446b9544