Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 07:12
Behavioral task
behavioral1
Sample
JaffaCakes118_3781a4a914514113da9daa99927493bd.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_3781a4a914514113da9daa99927493bd.exe
-
Size
87KB
-
MD5
3781a4a914514113da9daa99927493bd
-
SHA1
84a417600629b89dd1c6bdca5b309a9c32ebfc7a
-
SHA256
436b614983d377046341920512037fafe9bf038b9e220193bb3a204a9372dc8a
-
SHA512
71603dd9f24ef76559125326277ad5596266a84bcdc78a4d8855f2c8015c48aef79a84e4664be108dfe40ee987cec72b4a63ddd6caefbe218c46670db635955b
-
SSDEEP
1536:kWZ/Sxlnl9IioY3ldKhTMdcEytfLIeI7nV9e3RnX9toreOv3/DRmR:bBSxSo3ldMMdbyVLIemnV9gJ9tQeOv3o
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x000d00000001202b-2.dat family_gh0strat behavioral1/files/0x0009000000016d3a-5.dat family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2596 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2060 Msdofyjk.exe -
Loads dropped DLL 1 IoCs
pid Process 2004 CALC.EXE -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Msdofyjk.exe JaffaCakes118_3781a4a914514113da9daa99927493bd.exe File opened for modification C:\Windows\Msdofyjk.exe JaffaCakes118_3781a4a914514113da9daa99927493bd.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CALC.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3781a4a914514113da9daa99927493bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msdofyjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2600 JaffaCakes118_3781a4a914514113da9daa99927493bd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2596 2600 JaffaCakes118_3781a4a914514113da9daa99927493bd.exe 31 PID 2600 wrote to memory of 2596 2600 JaffaCakes118_3781a4a914514113da9daa99927493bd.exe 31 PID 2600 wrote to memory of 2596 2600 JaffaCakes118_3781a4a914514113da9daa99927493bd.exe 31 PID 2600 wrote to memory of 2596 2600 JaffaCakes118_3781a4a914514113da9daa99927493bd.exe 31 PID 2060 wrote to memory of 2004 2060 Msdofyjk.exe 32 PID 2060 wrote to memory of 2004 2060 Msdofyjk.exe 32 PID 2060 wrote to memory of 2004 2060 Msdofyjk.exe 32 PID 2060 wrote to memory of 2004 2060 Msdofyjk.exe 32 PID 2060 wrote to memory of 2004 2060 Msdofyjk.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3781a4a914514113da9daa99927493bd.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3781a4a914514113da9daa99927493bd.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2596
-
-
C:\Windows\Msdofyjk.exeC:\Windows\\Msdofyjk.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\CALC.EXEC:\Windows\system32\CALC.EXE2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD53781a4a914514113da9daa99927493bd
SHA184a417600629b89dd1c6bdca5b309a9c32ebfc7a
SHA256436b614983d377046341920512037fafe9bf038b9e220193bb3a204a9372dc8a
SHA51271603dd9f24ef76559125326277ad5596266a84bcdc78a4d8855f2c8015c48aef79a84e4664be108dfe40ee987cec72b4a63ddd6caefbe218c46670db635955b
-
Filesize
76KB
MD5c47404a3d72d423bce6c97907fab3844
SHA1479df6a770148894293c5c2687b19c3afd026530
SHA256c272c443b5af34fb77d7ef0a02b32e26dfea970680096ef545d5bac965af5457
SHA5125beb46586591b8236e63c604b74c9408ae419f762406576a30ae9d88fea6dbf09072ec4f5570e06f7a648c28a6d4bb7442d9788af056eaeda9306fcc724093b5