Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 11:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe
-
Size
192KB
-
MD5
389e2d7a5506cd415a52911097b0033b
-
SHA1
233e09b535f5bf306aca65091ddccb90626e36bf
-
SHA256
692e3ee871b2bf106bde0999b05b87cdaa54f607399ab662a8cf311e66cc524e
-
SHA512
67bb2c6daac576f426e635480c6ab93bd5af3c4d3b34ef9d44d73770d1ab8063e709300b93884a60351c3be365edd91a6e502105c318589678daa3944a2d12fb
-
SSDEEP
3072:h1il1aIwVZJb+bt5HClWme7s6guy0By1wZwSlbG7hC1sQvJuc:hsaIwVub7HCQry0BTZwWGdC1ssJu
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/files/0x00090000000161f6-5.dat family_gh0strat behavioral1/memory/792-7-0x0000000010000000-0x0000000010027000-memory.dmp family_gh0strat behavioral1/memory/2340-8-0x0000000000400000-0x0000000000431000-memory.dmp family_gh0strat behavioral1/memory/792-9-0x0000000010000000-0x0000000010027000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\fastuserswitchingcompatibility\Parameters\ServiceDll = "C:\\PROGRA~2\\fxlib\\fxlib.dll" svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\fastuserswitchingcompatibility\Parameters\ServiceDll = "C:\\PROGRA~2\\fxlib\\fxlib.dll" JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\fastuserswitchingcompatibility\ImagePath = "%SystemRoot%\\System32\\svchost.exe -k netsvcs" svchost.exe -
Deletes itself 1 IoCs
pid Process 792 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 792 svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe -
Drops file in System32 directory 13 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ab5e7ac5.del JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe File opened for modification C:\Windows\SysWOW64\b198415e.del JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe File opened for modification C:\Windows\SysWOW64\81771310.del JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe File opened for modification C:\Windows\SysWOW64\d2f5ca0e.del JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe File opened for modification C:\Windows\SysWOW64\dad53dd.del JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe File opened for modification C:\Windows\SysWOW64\4ef54a5d.del JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe File opened for modification C:\Windows\SysWOW64\a8c20fb6.del JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe File opened for modification C:\Windows\SysWOW64\bda338ff.del JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe File opened for modification C:\Windows\SysWOW64\a4363793.del JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe File opened for modification C:\Windows\SysWOW64\9b56e972.del JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe File opened for modification C:\Windows\SysWOW64\35172304.del JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe File opened for modification C:\Windows\SysWOW64\4ac26bd1.del JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe File opened for modification C:\Windows\SysWOW64\729d73e9.del JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\PROGRA~2\fxlib\fxlib.dll JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe File opened for modification C:\PROGRA~2\fxlib\fxlib.dlll JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2340 JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe 792 svchost.exe 792 svchost.exe 792 svchost.exe 792 svchost.exe 792 svchost.exe 792 svchost.exe 792 svchost.exe 792 svchost.exe 792 svchost.exe 792 svchost.exe 792 svchost.exe 792 svchost.exe 792 svchost.exe 792 svchost.exe 792 svchost.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeBackupPrivilege 792 svchost.exe Token: SeSecurityPrivilege 792 svchost.exe Token: SeSecurityPrivilege 792 svchost.exe Token: SeBackupPrivilege 792 svchost.exe Token: SeSecurityPrivilege 792 svchost.exe Token: SeBackupPrivilege 792 svchost.exe Token: SeSecurityPrivilege 792 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_389e2d7a5506cd415a52911097b0033b.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Server Software Component: Terminal Services DLL
- Sets service image path in registry
- Deletes itself
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:792
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD550d3b9564488621c7c8a5c92b6e83ab7
SHA125409235ac4a6a900db97bc536da8e2264b70b03
SHA256fb0f61db6e2d101eb1cbc0f17dc3a624371e2b0a50e5b12dd4a3d7f3aea807e1
SHA5120c2048d0afec48b9495a05a49b263fb0cb92634100f22e22499393a46b7e40e73ebaa071454cbbd0468be2a614eade3eb5e0e84d90167034c860c30b6927aa6c