Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_390de04570dc1151bb6e94b73fffe9b0.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_390de04570dc1151bb6e94b73fffe9b0.exe
-
Size
91KB
-
MD5
390de04570dc1151bb6e94b73fffe9b0
-
SHA1
381829d8086eee00349f885ebd6953ffb5f296d1
-
SHA256
0266c61236b0ada15d7b2141555398ebe14c70b2b836bed49e624bbcd7004531
-
SHA512
d0d9297a084e2113a92f812167f2c684c076baeb186e97ece5c6627a21ca67c1744f6f464cb4478201dbd8d2f31b3dc6be052713d58ababf529ffbc15be642ed
-
SSDEEP
1536:Qxe2q7nxZ785AIdeTRh0XhDq74rGNQF+U5xMPPc0c8HFpHuvSj38BN+x6SAS:Qxeh7ZIdeTRhH7mF+U5xMPE0c8HFln7/
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral1/memory/1272-2-0x0000000000400000-0x0000000000465000-memory.dmp family_gh0strat behavioral1/memory/1272-11-0x0000000000400000-0x0000000000465000-memory.dmp family_gh0strat behavioral1/memory/2600-14-0x0000000000400000-0x0000000000465000-memory.dmp family_gh0strat behavioral1/files/0x0009000000015d59-18.dat family_gh0strat behavioral1/memory/2600-20-0x0000000000400000-0x0000000000465000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2600 hncrnfktpv -
Executes dropped EXE 1 IoCs
pid Process 2600 hncrnfktpv -
Loads dropped DLL 3 IoCs
pid Process 1272 JaffaCakes118_390de04570dc1151bb6e94b73fffe9b0.exe 1272 JaffaCakes118_390de04570dc1151bb6e94b73fffe9b0.exe 3020 svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\chcyslpewr svchost.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\StormII\%SESSIONNAME%\igfhr.cc3 hncrnfktpv -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hncrnfktpv Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_390de04570dc1151bb6e94b73fffe9b0.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2600 hncrnfktpv 3020 svchost.exe 3020 svchost.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeRestorePrivilege 2600 hncrnfktpv Token: SeBackupPrivilege 2600 hncrnfktpv Token: SeBackupPrivilege 2600 hncrnfktpv Token: SeRestorePrivilege 2600 hncrnfktpv Token: SeBackupPrivilege 3020 svchost.exe Token: SeRestorePrivilege 3020 svchost.exe Token: SeBackupPrivilege 3020 svchost.exe Token: SeBackupPrivilege 3020 svchost.exe Token: SeSecurityPrivilege 3020 svchost.exe Token: SeSecurityPrivilege 3020 svchost.exe Token: SeBackupPrivilege 3020 svchost.exe Token: SeBackupPrivilege 3020 svchost.exe Token: SeSecurityPrivilege 3020 svchost.exe Token: SeBackupPrivilege 3020 svchost.exe Token: SeBackupPrivilege 3020 svchost.exe Token: SeSecurityPrivilege 3020 svchost.exe Token: SeBackupPrivilege 3020 svchost.exe Token: SeRestorePrivilege 3020 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1272 wrote to memory of 2600 1272 JaffaCakes118_390de04570dc1151bb6e94b73fffe9b0.exe 30 PID 1272 wrote to memory of 2600 1272 JaffaCakes118_390de04570dc1151bb6e94b73fffe9b0.exe 30 PID 1272 wrote to memory of 2600 1272 JaffaCakes118_390de04570dc1151bb6e94b73fffe9b0.exe 30 PID 1272 wrote to memory of 2600 1272 JaffaCakes118_390de04570dc1151bb6e94b73fffe9b0.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_390de04570dc1151bb6e94b73fffe9b0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_390de04570dc1151bb6e94b73fffe9b0.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
\??\c:\users\admin\appdata\local\hncrnfktpv"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_390de04570dc1151bb6e94b73fffe9b0.exe" a -sc:\users\admin\appdata\local\temp\jaffacakes118_390de04570dc1151bb6e94b73fffe9b0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24.1MB
MD59e04b99305b56c0330c9cca904063d97
SHA1aaa583e76903d4dbb0dbaaa3a77bb69fe836ec4b
SHA256ba3fae410f71fe044311f83eefd9dd8b0e5192ba6800c893ea9bad229331d649
SHA512e35e915d12f91ed891ba5a4e7442f961a42216952d7c6a56fda71bcc43a0c80144404b5a89f44725bd3c25643df80f22f07030fca8161f3aa79434772720690f
-
Filesize
23.4MB
MD50321912a6fb49f93b6a99e1a8f2e7296
SHA197c2124af623e5135cfbad304d9422b02c2544cf
SHA2569e650b60851f7551678fd1bdeee1708150daded9b9bcade85b7fa5f4727fd343
SHA512ce3687796ecaa5d5d6db3680187991008d4b8b6144e822922634a5e9b37bfe50d89ecc80be560b605e384d5652ca1f1495d1e1e172710dda91c178d625f9d014