Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/03/2025, 19:41

General

  • Target

    JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe

  • Size

    146KB

  • MD5

    3b25e2cd6af9205b25a75f749f3734a8

  • SHA1

    7c099bbd960044d43dc5e4a297387fcf4289fb36

  • SHA256

    29e00945e632c4a0666365a3b0b13ceb58c0e426c0d6264899d75d05ddf208eb

  • SHA512

    b128ba9c9fac119e8c76df7ccdc5ecb0f77af33eff9913358684bcd7a58f75d0d4b079873bc04735d477aa0161f149bc92a5fe781f188bb195dcf9f8e01e5390

  • SSDEEP

    3072:OhZWRdXEoC1soqk+69+F7IRHe0s+HfVlTrQrTw+9Ty:OhZMC1h+6907IRHf5NlHYw+1

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Users\Admin\AppData\Local\Temp\closesfc.jpg
      C:\Users\Admin\AppData\Local\Temp\\closesfc.jpg
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2756
    • C:\Windows\SysWOW64\net.exe
      net start TrkWks
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 start TrkWks
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2676
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c erase /F "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\closesfc.jpg

    Filesize

    28KB

    MD5

    e483656c90e267e0ab2adee7df61f75e

    SHA1

    c2db5c21d670bc9ec9d8c76f759f8dc94469aa26

    SHA256

    3c0078fc1a11ffea606ab73c734e4cdfd6b1d8b9897820cd3d0d93c3ff23e344

    SHA512

    4bab5e5321859632824aaa612d0e65207f186d544427b7f91a007cdb70147345aeaf3bf2438060ad9f3aad27cdd37d1a746c331f156d451b07944f7fec95ab97

  • memory/2744-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB