Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe
-
Size
58KB
-
MD5
389def358262aee04d1a7fc5cbe1572f
-
SHA1
001435cc319e22d60c457f896461012dea714491
-
SHA256
38f3e8f3eaa146b7d24fc35b01a8b711cec828205879cf5baad4fd548bde0a73
-
SHA512
2887f7cc0eb0da2dcd0513a918bab27e3267d376f956282ff9aff8d1277202865296af630fe9cc376b3df2ac8323510c2411897752f1be931444533e020dbd69
-
SSDEEP
1536:N7yxiWeexIhxb+g86PKwQJvIzp9fuPfXdCeC:NyxiWeeehp+NwQBIttuHsH
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral1/files/0x00080000000120ff-2.dat family_gh0strat behavioral1/memory/2080-9-0x0000000010000000-0x000000001001F000-memory.dmp family_gh0strat behavioral1/memory/348-10-0x0000000010000000-0x000000001001F000-memory.dmp family_gh0strat behavioral1/memory/348-11-0x0000000000400000-0x0000000000434000-memory.dmp family_gh0strat behavioral1/memory/1804-12-0x0000000010000000-0x000000001001F000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\36OService\Parameters\ServiceDll = "C:\\Windows\\system32\\36OService.dll" rundll32.exe -
Deletes itself 1 IoCs
pid Process 1252 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 348 JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\36OService.ini JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 348 JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 348 wrote to memory of 2080 348 JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe 30 PID 348 wrote to memory of 2080 348 JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe 30 PID 348 wrote to memory of 2080 348 JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe 30 PID 348 wrote to memory of 2080 348 JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe 30 PID 348 wrote to memory of 2080 348 JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe 30 PID 348 wrote to memory of 2080 348 JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe 30 PID 348 wrote to memory of 2080 348 JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe 30 PID 348 wrote to memory of 1252 348 JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe 32 PID 348 wrote to memory of 1252 348 JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe 32 PID 348 wrote to memory of 1252 348 JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe 32 PID 348 wrote to memory of 1252 348 JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_389def358262aee04d1a7fc5cbe1572f.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\36OService.dll setup2⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
PID:2080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1252
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- System Location Discovery: System Language Discovery
PID:1804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5c6919874d1839684c87d98438f9f4ed5
SHA134cce91d12ecf5cdd7dd409dcf11ae9ad85f7563
SHA256e2c5bcb514cb6baecc716890af6e731c9a094964bb3aa6b5d643297c6e27b31d
SHA512344d8bba0cabc612f61e264bf4490c1a39d2d299947e64cd55beda117187750c3833f1d994d8c3dbcdd8e217eec5aebad4e07f5b4e020e438df74e926030ec75