Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 14:30
Behavioral task
behavioral1
Sample
JaffaCakes118_3994d0ecada2b6315bd2ce9d1398f546.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3994d0ecada2b6315bd2ce9d1398f546.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_3994d0ecada2b6315bd2ce9d1398f546.exe
-
Size
128KB
-
MD5
3994d0ecada2b6315bd2ce9d1398f546
-
SHA1
c2a6b5973830219f6543f5dd37c20bfe2373cf56
-
SHA256
a84b257dbc7372386b6201aa17c8cc0e0e848a52509f95a169da7e961edfc263
-
SHA512
1ab10d7eca8b8b073aee72313b83df7bd683e6ebbcb255fcd79e96f51509612d3e7d17e706fd820880881590683e0eebfcdd8b09371bd4fe44fc178269f02b8d
-
SSDEEP
3072:R7e4vjk2YuEv+K+z6nPp8D+RDjxee7PK3gph0dofggCxfR:R7e4vjkTuEv+VecmMeT0w0dQtCr
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral1/memory/2160-0-0x0000000000400000-0x0000000000422000-memory.dmp family_gh0strat behavioral1/memory/2160-3-0x0000000000400000-0x0000000000422000-memory.dmp family_gh0strat behavioral1/memory/2912-5-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat behavioral1/files/0x000b000000012282-4.dat family_gh0strat behavioral1/memory/2912-6-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WindowsVideoLy\Parameters\ServiceDll = "C:\\Windows\\system32\\userdata.dll" JaffaCakes118_3994d0ecada2b6315bd2ce9d1398f546.exe -
Deletes itself 1 IoCs
pid Process 2912 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2912 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\userdata.dll JaffaCakes118_3994d0ecada2b6315bd2ce9d1398f546.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3994d0ecada2b6315bd2ce9d1398f546.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3994d0ecada2b6315bd2ce9d1398f546.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3994d0ecada2b6315bd2ce9d1398f546.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2160
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD51e3e85b2630f270be92e189072810607
SHA11a8e52051bd2cbbd9a4a1e518ffc1431d4d7c683
SHA2564f8abf5d50d14d1aa62616c93b0268a3a66af63abff982c2f704b77a6eefd721
SHA512757ba5ffcd3e11d07611133f2f2d676a1202dc8ca2ff3ce6c55666679d7452ab34ece61625d3948ccfdcf0284252fa51cb394e375fb965a9a8d2cdc87e0b19ca