Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    01/03/2025, 11:02

General

  • Target

    JaffaCakes118_38a0165cbec945f4e455c58ef95181a2.exe

  • Size

    316KB

  • MD5

    38a0165cbec945f4e455c58ef95181a2

  • SHA1

    132fc6685d5f0334a10d1d7048558170a5f44434

  • SHA256

    2281e2bff2d96092d625a0001e8f896453157c284aee5d3de314a5f5d3ad2166

  • SHA512

    74c4d20a84be87bee7b850928c0fff29dcee0747e081ed5bec160a9a31be9e8ba9ec39403ba0eb351fc8a1f11b53b40b7090efeab0f92afd0ccde4d6215bd9c6

  • SSDEEP

    6144:eQq/4k9wm+bdTpPw/+V3NU3wOs0DutQe4y7c1PESIJ/EPuUrC:rdNNn8utQRgcpEL/E/W

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 12 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38a0165cbec945f4e455c58ef95181a2.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38a0165cbec945f4e455c58ef95181a2.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Users\Admin\AppData\Roaming\install140785875.exe
      "C:\Users\Admin\AppData\Roaming\install140785875.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38a0165cbec945f4e455c58ef95181a2.exe" -sC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38a0165cbec945f4e455c58ef95181a2.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1944
    • C:\Users\Admin\AppData\Roaming\PPTV_2[1].5.5.0003_forqd234.exe
      "C:\Users\Admin\AppData\Roaming\PPTV_2[1].5.5.0003_forqd234.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:484
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2876
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2252
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2584
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k regsvc
    1⤵
      PID:2720

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\PPTV_2[1].5.5.0003_forqd234.exe

      Filesize

      344KB

      MD5

      b60805b0785d078f8c9aeaa20e572ba4

      SHA1

      e5956931e0f4959fd73f88cff679ad384b116dd6

      SHA256

      55ab0a5b7f933096f638b0de7d6a01e4a0cc9e9a3d8d633386a0d37eaac43b0e

      SHA512

      06d74ea0116ffd79fa10c4fc7653a56693c2cc67917eefd5032a63ade45a08a82cd590064143ea8d433f4106b9ebb90fa44eaa2f7dc378adf041a1bddddd1ce0

    • \??\c:\program files (x86)\realtek\driver\date\is%sessionname%\ftlfp.cc3

      Filesize

      19.0MB

      MD5

      4d6c01495eb613545451301d00b32ba1

      SHA1

      dde6cb1fcb5c91e74d514f14e409fc4b197e9a15

      SHA256

      6c4de5a4be472beec42990d17514ad99359f3f8df7db3851aaa80a4061500177

      SHA512

      99497479c377152bf6771e38f06cb5f1826dc92d3e5fc26bb41c492b362d1b19d51dd19bc22d9b7435345f80ffbc1bb3c780c8bb876946f021434d5db3c2f59a

    • \Users\Admin\AppData\Roaming\install140785875.exe

      Filesize

      21.1MB

      MD5

      b888ee89fee7dedb526a5e3f654c1dfa

      SHA1

      626f5cee1004a19e3b62782172b7654c6a9a48ef

      SHA256

      367528262cf8abb5fbaf2e3991a644bcab809dde56806c1ba205b56dbd8d08f5

      SHA512

      cc60074dc4a3a53a07106e375d8ce9cc981c8b8ada8527a6d3fdbf1ebb953fc9f99918fcc8938b55fe2bdc2d3bdadaff8717e9d46fec0e369a81daaae242434f