Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 07:12
Behavioral task
behavioral1
Sample
JaffaCakes118_3781a4a914514113da9daa99927493bd.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_3781a4a914514113da9daa99927493bd.exe
-
Size
87KB
-
MD5
3781a4a914514113da9daa99927493bd
-
SHA1
84a417600629b89dd1c6bdca5b309a9c32ebfc7a
-
SHA256
436b614983d377046341920512037fafe9bf038b9e220193bb3a204a9372dc8a
-
SHA512
71603dd9f24ef76559125326277ad5596266a84bcdc78a4d8855f2c8015c48aef79a84e4664be108dfe40ee987cec72b4a63ddd6caefbe218c46670db635955b
-
SSDEEP
1536:kWZ/Sxlnl9IioY3ldKhTMdcEytfLIeI7nV9e3RnX9toreOv3/DRmR:bBSxSo3ldMMdbyVLIemnV9gJ9tQeOv3o
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x000e000000023bae-2.dat family_gh0strat behavioral2/files/0x0009000000023c8a-5.dat family_gh0strat -
Gh0strat family
-
Executes dropped EXE 1 IoCs
pid Process 5036 Msdofyjk.exe -
Loads dropped DLL 1 IoCs
pid Process 2172 CALC.EXE -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Msdofyjk.exe JaffaCakes118_3781a4a914514113da9daa99927493bd.exe File opened for modification C:\Windows\Msdofyjk.exe JaffaCakes118_3781a4a914514113da9daa99927493bd.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3781a4a914514113da9daa99927493bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msdofyjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CALC.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2664 JaffaCakes118_3781a4a914514113da9daa99927493bd.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2664 wrote to memory of 3736 2664 JaffaCakes118_3781a4a914514113da9daa99927493bd.exe 91 PID 2664 wrote to memory of 3736 2664 JaffaCakes118_3781a4a914514113da9daa99927493bd.exe 91 PID 2664 wrote to memory of 3736 2664 JaffaCakes118_3781a4a914514113da9daa99927493bd.exe 91 PID 5036 wrote to memory of 2172 5036 Msdofyjk.exe 92 PID 5036 wrote to memory of 2172 5036 Msdofyjk.exe 92 PID 5036 wrote to memory of 2172 5036 Msdofyjk.exe 92 PID 5036 wrote to memory of 2172 5036 Msdofyjk.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3781a4a914514113da9daa99927493bd.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3781a4a914514113da9daa99927493bd.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3736
-
-
C:\Windows\Msdofyjk.exeC:\Windows\\Msdofyjk.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\CALC.EXEC:\Windows\system32\CALC.EXE2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD53781a4a914514113da9daa99927493bd
SHA184a417600629b89dd1c6bdca5b309a9c32ebfc7a
SHA256436b614983d377046341920512037fafe9bf038b9e220193bb3a204a9372dc8a
SHA51271603dd9f24ef76559125326277ad5596266a84bcdc78a4d8855f2c8015c48aef79a84e4664be108dfe40ee987cec72b4a63ddd6caefbe218c46670db635955b
-
Filesize
76KB
MD5c47404a3d72d423bce6c97907fab3844
SHA1479df6a770148894293c5c2687b19c3afd026530
SHA256c272c443b5af34fb77d7ef0a02b32e26dfea970680096ef545d5bac965af5457
SHA5125beb46586591b8236e63c604b74c9408ae419f762406576a30ae9d88fea6dbf09072ec4f5570e06f7a648c28a6d4bb7442d9788af056eaeda9306fcc724093b5