Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 19:13
Behavioral task
behavioral1
Sample
JaffaCakes118_3aff15c668057f327358fc546dfaa92f.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_3aff15c668057f327358fc546dfaa92f.exe
-
Size
139KB
-
MD5
3aff15c668057f327358fc546dfaa92f
-
SHA1
98e4a0b9dede20504e24da08aadb898caeec363d
-
SHA256
20a5c23e7dddbab446df0d7d6b9eaa2c54687d9050841cbb2305ad98814bac0f
-
SHA512
74e849d2b1f9d9a197bace710435932fb13c6dd3b4516f241f5b79061f6e326200908d998e41b71de10787a900d7f355fd640f0079b88eaf7667355936e07e04
-
SSDEEP
3072:T7WLeYPiFfs8qr+Nw7h+Feu4g8qbACPAKJrF3MIOo47u:TVs8qVTohAM1lKI7c
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/files/0x000d000000015ccf-5.dat family_gh0strat behavioral1/files/0x000d000000015ccf-8.dat family_gh0strat behavioral1/memory/2072-9-0x0000000010000000-0x0000000010024000-memory.dmp family_gh0strat behavioral1/files/0x000a000000015685-12.dat family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 1472 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1472 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Bwxy\Gwxyabcde.gif JaffaCakes118_3aff15c668057f327358fc546dfaa92f.exe File created C:\Program Files (x86)\Bwxy\Gwxyabcde.gif JaffaCakes118_3aff15c668057f327358fc546dfaa92f.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3aff15c668057f327358fc546dfaa92f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 2072 JaffaCakes118_3aff15c668057f327358fc546dfaa92f.exe Token: SeRestorePrivilege 2072 JaffaCakes118_3aff15c668057f327358fc546dfaa92f.exe Token: SeBackupPrivilege 2072 JaffaCakes118_3aff15c668057f327358fc546dfaa92f.exe Token: SeRestorePrivilege 2072 JaffaCakes118_3aff15c668057f327358fc546dfaa92f.exe Token: SeBackupPrivilege 2072 JaffaCakes118_3aff15c668057f327358fc546dfaa92f.exe Token: SeRestorePrivilege 2072 JaffaCakes118_3aff15c668057f327358fc546dfaa92f.exe Token: SeBackupPrivilege 2072 JaffaCakes118_3aff15c668057f327358fc546dfaa92f.exe Token: SeRestorePrivilege 2072 JaffaCakes118_3aff15c668057f327358fc546dfaa92f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3aff15c668057f327358fc546dfaa92f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3aff15c668057f327358fc546dfaa92f.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD573b5d4d05e08214936f908cea771a814
SHA1a6dd98582f273ba0592665544fdb8cfaa1f303a6
SHA25679276446b2ecac6cf6563e4669f9cbed8f1b2507a471200242c317f17a719db4
SHA512f5d163dac76107b71ec65aff1d2862cbf868b863509d3ccd110d588af384f4b4f357277576f7464220ab58eab9724ebf79537ca0dec168c97f7a833bb3303331
-
Filesize
155KB
MD5be7ce67af1cd67b98629afcf5d4ff254
SHA1f68e2711014266256bf48aaf2d047cff9b93e772
SHA2566c448beba3fd44e6eb54026e6b1f26b5e4b595271311935f18e5ddeec6956bb3
SHA51252ecb451a14b38f6f470c15cfa16f9ec6ff67fdd7b5760cd6f13709092adc18d8389255dd65ccf453dc9112fa2056a5e25deefdff7cc82e35c4c4c5aefb4a7f0
-
Filesize
99B
MD5d07e11a6f670a20bf775ef3912086510
SHA143766674ccc01b4c32cc905a7b119274cd9a042a
SHA2566550cb28a92afb8311a86df0c8404025812b02214c060c3709ee846dbe57ef18
SHA5127b872a9643689745549858dd3670f99cf52dd8029effcde45d5caecde7bda44509daf871532fbf5ecb1c2673fb570ba865ff3c8ede05d8693ab2ef1fb8b2ca4b
-
Filesize
12.0MB
MD54c609d1689c11242920af7ece01b8287
SHA1d0d3274df7c9de349d18632d407ac0845b47f238
SHA2568b3adaf070f2d3023d10e5cd4847cd5e9a416801424469c8cf43934b1e6858c9
SHA512e373cceca1d367ca0f3427cee52d5fe89dcab510d526d0cf092badcf47f497877efd2e7aef30975c216dacd189e6e673105dd8408297813ca815f061377b8417