Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 19:41
Behavioral task
behavioral1
Sample
JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe
-
Size
146KB
-
MD5
3b25e2cd6af9205b25a75f749f3734a8
-
SHA1
7c099bbd960044d43dc5e4a297387fcf4289fb36
-
SHA256
29e00945e632c4a0666365a3b0b13ceb58c0e426c0d6264899d75d05ddf208eb
-
SHA512
b128ba9c9fac119e8c76df7ccdc5ecb0f77af33eff9913358684bcd7a58f75d0d4b079873bc04735d477aa0161f149bc92a5fe781f188bb195dcf9f8e01e5390
-
SSDEEP
3072:OhZWRdXEoC1soqk+69+F7IRHe0s+HfVlTrQrTw+9Ty:OhZMC1h+6907IRHf5NlHYw+1
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2744-10-0x0000000000400000-0x000000000042E000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2788 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2756 closesfc.jpg -
Loads dropped DLL 2 IoCs
pid Process 2744 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe 2744 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2756 closesfc.jpg 2756 closesfc.jpg -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2756 closesfc.jpg -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2756 2744 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe 31 PID 2744 wrote to memory of 2756 2744 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe 31 PID 2744 wrote to memory of 2756 2744 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe 31 PID 2744 wrote to memory of 2756 2744 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe 31 PID 2744 wrote to memory of 2824 2744 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe 33 PID 2744 wrote to memory of 2824 2744 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe 33 PID 2744 wrote to memory of 2824 2744 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe 33 PID 2744 wrote to memory of 2824 2744 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe 33 PID 2744 wrote to memory of 2788 2744 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe 34 PID 2744 wrote to memory of 2788 2744 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe 34 PID 2744 wrote to memory of 2788 2744 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe 34 PID 2744 wrote to memory of 2788 2744 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe 34 PID 2824 wrote to memory of 2676 2824 net.exe 37 PID 2824 wrote to memory of 2676 2824 net.exe 37 PID 2824 wrote to memory of 2676 2824 net.exe 37 PID 2824 wrote to memory of 2676 2824 net.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\closesfc.jpgC:\Users\Admin\AppData\Local\Temp\\closesfc.jpg2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Windows\SysWOW64\net.exenet start TrkWks2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TrkWks3⤵
- System Location Discovery: System Language Discovery
PID:2676
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c erase /F "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5e483656c90e267e0ab2adee7df61f75e
SHA1c2db5c21d670bc9ec9d8c76f759f8dc94469aa26
SHA2563c0078fc1a11ffea606ab73c734e4cdfd6b1d8b9897820cd3d0d93c3ff23e344
SHA5124bab5e5321859632824aaa612d0e65207f186d544427b7f91a007cdb70147345aeaf3bf2438060ad9f3aad27cdd37d1a746c331f156d451b07944f7fec95ab97