Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 07:33
Behavioral task
behavioral1
Sample
JaffaCakes118_3799b16d1a28b031cf761ac3b2539d7b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3799b16d1a28b031cf761ac3b2539d7b.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_3799b16d1a28b031cf761ac3b2539d7b.exe
-
Size
196KB
-
MD5
3799b16d1a28b031cf761ac3b2539d7b
-
SHA1
d568cac4c45dd3c0cc46051edb9949a48cf7a26f
-
SHA256
018a11878b175039255fafc575acffc59dc0620ade4f4c6ca38ec11b01317cf4
-
SHA512
5b4089bfd2ac5d5acba1a2cf666a40b8d1ee6d7947132fe48b9be32e82e62c510ec222f01a4c426c2708d30631810850bf5b88c2b6fc2a4dd99e8d55849ba59a
-
SSDEEP
3072:+eMWMcMgoEt3zk9z4Uh+yQAbAbu7NWtMpebimeN7kgMwzi/HPeqov:+ekcw5DTQAbbMbxg7kVwzSeqo
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2540-10-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat behavioral1/memory/2924-13-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2924 svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\FileName.jpg JaffaCakes118_3799b16d1a28b031cf761ac3b2539d7b.exe File created C:\Windows\FileName.jpg JaffaCakes118_3799b16d1a28b031cf761ac3b2539d7b.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3799b16d1a28b031cf761ac3b2539d7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 2540 JaffaCakes118_3799b16d1a28b031cf761ac3b2539d7b.exe Token: SeRestorePrivilege 2540 JaffaCakes118_3799b16d1a28b031cf761ac3b2539d7b.exe Token: SeBackupPrivilege 2540 JaffaCakes118_3799b16d1a28b031cf761ac3b2539d7b.exe Token: SeRestorePrivilege 2540 JaffaCakes118_3799b16d1a28b031cf761ac3b2539d7b.exe Token: SeBackupPrivilege 2540 JaffaCakes118_3799b16d1a28b031cf761ac3b2539d7b.exe Token: SeRestorePrivilege 2540 JaffaCakes118_3799b16d1a28b031cf761ac3b2539d7b.exe Token: SeBackupPrivilege 2540 JaffaCakes118_3799b16d1a28b031cf761ac3b2539d7b.exe Token: SeRestorePrivilege 2540 JaffaCakes118_3799b16d1a28b031cf761ac3b2539d7b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3799b16d1a28b031cf761ac3b2539d7b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3799b16d1a28b031cf761ac3b2539d7b.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99B
MD5b38ce2194563d5b9e32243f89b407e33
SHA16874477356f52a16b1374d9f48236dcd38090aad
SHA25639b6b0078976ed534802e4090a9bc6469ffb21d35ab368e2c66bf0b59e4af84d
SHA512f90912a093d2db943b24b5e6c45aa92a6e2bc4e82188eadd615a23f8c8c1c298978e6b1842220eadf56bc8ee3d498a564be7c2666eba7868b6970bae64050ce0