Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 19:41
Behavioral task
behavioral1
Sample
JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe
-
Size
146KB
-
MD5
3b25e2cd6af9205b25a75f749f3734a8
-
SHA1
7c099bbd960044d43dc5e4a297387fcf4289fb36
-
SHA256
29e00945e632c4a0666365a3b0b13ceb58c0e426c0d6264899d75d05ddf208eb
-
SHA512
b128ba9c9fac119e8c76df7ccdc5ecb0f77af33eff9913358684bcd7a58f75d0d4b079873bc04735d477aa0161f149bc92a5fe781f188bb195dcf9f8e01e5390
-
SSDEEP
3072:OhZWRdXEoC1soqk+69+F7IRHe0s+HfVlTrQrTw+9Ty:OhZMC1h+6907IRHf5NlHYw+1
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/2160-6-0x0000000000400000-0x000000000042E000-memory.dmp family_gh0strat -
Gh0strat family
-
Executes dropped EXE 1 IoCs
pid Process 3732 closesfc.jpg -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language closesfc.jpg Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3732 closesfc.jpg 3732 closesfc.jpg -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3732 closesfc.jpg -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2160 wrote to memory of 3732 2160 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe 87 PID 2160 wrote to memory of 3732 2160 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe 87 PID 2160 wrote to memory of 3732 2160 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe 87 PID 2160 wrote to memory of 4516 2160 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe 99 PID 2160 wrote to memory of 4516 2160 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe 99 PID 2160 wrote to memory of 4516 2160 JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\closesfc.jpgC:\Users\Admin\AppData\Local\Temp\\closesfc.jpg2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Windows\SysWOW64\cmd.execmd /c erase /F "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b25e2cd6af9205b25a75f749f3734a8.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4516
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5e483656c90e267e0ab2adee7df61f75e
SHA1c2db5c21d670bc9ec9d8c76f759f8dc94469aa26
SHA2563c0078fc1a11ffea606ab73c734e4cdfd6b1d8b9897820cd3d0d93c3ff23e344
SHA5124bab5e5321859632824aaa612d0e65207f186d544427b7f91a007cdb70147345aeaf3bf2438060ad9f3aad27cdd37d1a746c331f156d451b07944f7fec95ab97