Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 05:18
Behavioral task
behavioral1
Sample
JaffaCakes118_36f8fc192a3af32aeca3e6fe27b9517b.dll
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
JaffaCakes118_36f8fc192a3af32aeca3e6fe27b9517b.dll
-
Size
37KB
-
MD5
36f8fc192a3af32aeca3e6fe27b9517b
-
SHA1
5397180860d382b5b7861b329e49190d1f81b360
-
SHA256
0f44c4412e8d6fd16ba0eb633b12629a77defa6ab25901cc7718ebfc8f862735
-
SHA512
da022108e64a35a80fc70d4f100f3176363e02cbed21aca421b3fe3247022d946759a64d4ba75a9cf45e8b29bcca8c3cc79ba2c04e8eee8e312e195dd4c1e51c
-
SSDEEP
768:bbj5kZVnpEhqNO7t/+Y/S0c+PXcJhlGaPVy7YFNuGPjhrAtV:bbdkPakNO7t/fPZPXchl7/NuurAtV
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1736-0-0x0000000010000000-0x000000001000B000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2520 wrote to memory of 1736 2520 rundll32.exe 30 PID 2520 wrote to memory of 1736 2520 rundll32.exe 30 PID 2520 wrote to memory of 1736 2520 rundll32.exe 30 PID 2520 wrote to memory of 1736 2520 rundll32.exe 30 PID 2520 wrote to memory of 1736 2520 rundll32.exe 30 PID 2520 wrote to memory of 1736 2520 rundll32.exe 30 PID 2520 wrote to memory of 1736 2520 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_36f8fc192a3af32aeca3e6fe27b9517b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_36f8fc192a3af32aeca3e6fe27b9517b.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1736
-