Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2025, 00:14

General

  • Target

    JaffaCakes118_62214e260f8a65aa520c7ef6f3684c22.exe

  • Size

    1.7MB

  • MD5

    62214e260f8a65aa520c7ef6f3684c22

  • SHA1

    54083dbd2cf68955591e6419c4ce8b982e7d57d8

  • SHA256

    58e864323ea06853bb4dc2c4b8cf8802b10015d60b7327093ca2596cb2ef43d4

  • SHA512

    e7c4bc56c559690b39a2ff543d606908b4480d3826d86c6e0902e9a7dc2e9c9083c0fe478b76c9d80e5ef6bed26e743d395da4d580aab7dafd58ea6fa8d1ef20

  • SSDEEP

    49152:sfVY4WApWRrasEF4n2KrBUoiGX9URFvPTzKFyv:s9s2Jan2KrBniQQnTzK

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 5 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 7 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_62214e260f8a65aa520c7ef6f3684c22.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_62214e260f8a65aa520c7ef6f3684c22.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1132
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.ewasai.com/iclk/?zoneid=91&uid=63
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2796 CREDAT:17410 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2872
    • C:\Windows\SysWOW64\360LX111.exe
      C:\Windows\system32\\360LX111.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4388
    • C:\Windows\SysWOW64\360DL222.exe
      C:\Windows\system32\\360DL222.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3400
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k imgsvc
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:5048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\H2Y9DKVI\ErrorPageTemplate[1]

    Filesize

    2KB

    MD5

    f4fe1cb77e758e1ba56b8a8ec20417c5

    SHA1

    f4eda06901edb98633a686b11d02f4925f827bf0

    SHA256

    8d018639281b33da8eb3ce0b21d11e1d414e59024c3689f92be8904eb5779b5f

    SHA512

    62514ab345b6648c5442200a8e9530dfb88a0355e262069e0a694289c39a4a1c06c6143e5961074bfac219949102a416c09733f24e8468984b96843dc222b436

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\I86J5WJL\background_gradient[1]

    Filesize

    453B

    MD5

    20f0110ed5e4e0d5384a496e4880139b

    SHA1

    51f5fc61d8bf19100df0f8aadaa57fcd9c086255

    SHA256

    1471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b

    SHA512

    5f52c117e346111d99d3b642926139178a80b9ec03147c00e27f07aab47fe38e9319fe983444f3e0e36def1e86dd7c56c25e44b14efdc3f13b45ededa064db5a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\I86J5WJL\info_48[2]

    Filesize

    4KB

    MD5

    5565250fcc163aa3a79f0b746416ce69

    SHA1

    b97cc66471fcdee07d0ee36c7fb03f342c231f8f

    SHA256

    51129c6c98a82ea491f89857c31146ecec14c4af184517450a7a20c699c84859

    SHA512

    e60ea153b0fece4d311769391d3b763b14b9a140105a36a13dad23c2906735eaab9092236deb8c68ef078e8864d6e288bef7ef1731c1e9f1ad9b0170b95ac134

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\I86J5WJL\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MGQ8IQ23\bullet[1]

    Filesize

    447B

    MD5

    26f971d87ca00e23bd2d064524aef838

    SHA1

    7440beff2f4f8fabc9315608a13bf26cabad27d9

    SHA256

    1d8e5fd3c1fd384c0a7507e7283c7fe8f65015e521b84569132a7eabedc9d41d

    SHA512

    c62eb51be301bb96c80539d66a73cd17ca2021d5d816233853a37db72e04050271e581cc99652f3d8469b390003ca6c62dad2a9d57164c620b7777ae99aa1b15

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MGQ8IQ23\errorPageStrings[1]

    Filesize

    4KB

    MD5

    d65ec06f21c379c87040b83cc1abac6b

    SHA1

    208d0a0bb775661758394be7e4afb18357e46c8b

    SHA256

    a1270e90cea31b46432ec44731bf4400d22b38eb2855326bf934fe8f1b169a4f

    SHA512

    8a166d26b49a5d95aea49bc649e5ea58786a2191f4d2adac6f5fbb7523940ce4482d6a2502aa870a931224f215cb2010a8c9b99a2c1820150e4d365cab28299e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MGQ8IQ23\httpErrorPagesScripts[2]

    Filesize

    11KB

    MD5

    9234071287e637f85d721463c488704c

    SHA1

    cca09b1e0fba38ba29d3972ed8dcecefdef8c152

    SHA256

    65cc039890c7ceb927ce40f6f199d74e49b8058c3f8a6e22e8f916ad90ea8649

    SHA512

    87d691987e7a2f69ad8605f35f94241ab7e68ad4f55ad384f1f0d40dc59ffd1432c758123661ee39443d624c881b01dcd228a67afb8700fe5e66fc794a6c0384

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YK2OJUB8\navcancl[2]

    Filesize

    2KB

    MD5

    4bcfe9f8db04948cddb5e31fe6a7f984

    SHA1

    42464c70fc16f3f361c2419751acd57d51613cdf

    SHA256

    bee0439fcf31de76d6e2d7fd377a24a34ac8763d5bf4114da5e1663009e24228

    SHA512

    bb0ef3d32310644285f4062ad5f27f30649c04c5a442361a5dbe3672bd8cb585160187070872a31d9f30b70397d81449623510365a371e73bda580e00eef0e4e

  • C:\Users\temp2.gif

    Filesize

    106KB

    MD5

    d3db8e3614f714ea0a01f0afeb4d6992

    SHA1

    277d3dfcaa9387700fec70ffc390e0f402aa17ee

    SHA256

    901d8b8ccbe592f507bf4c6130841fb863e7a189a504f1e8ca69b508dc78ba1f

    SHA512

    6b9f991a7d58c11b271e194abec927b728c5a6906441547b050b120bde9399459e5dacca0b3c29b1bf838920595f17eac59a3f369d3d1eac3599c78fe3712156

  • C:\Windows\SysWOW64\360DL222.exe

    Filesize

    114KB

    MD5

    ae9006a7c112f2149bdbba71b45b0327

    SHA1

    263deb8d3dfab40dbe0eabae3dbc3fcdeb15c4ba

    SHA256

    c362b3dd13c79c2a332f10ff35a512b6045f23f6bf6a4f98c550db17b341a102

    SHA512

    68b1c396508fbeb3ceb4febc3b5e543641814c61770c5f14254960829ee1071a4ca319aa64a91728c8e632a60e2ab72ba00e51809670889aea5d75ad02cbc8cd

  • C:\Windows\SysWOW64\360LX111.exe

    Filesize

    660KB

    MD5

    847a0597a38d31e3c3dd05c9c079459c

    SHA1

    021bd79fed1b1b0f5d76b31ee39cde36ae1fcbcf

    SHA256

    5771d5681273dda751421f8f30e271f498ae56fffee01f8662227ccc4a5aa2ff

    SHA512

    2f86d87c71c339577ff2e85abb981fd24c17ca0c6c144652fd496883bfd3250d434eae02f711ece4cdcd1e1b719bcc9f81c95d59f87d39bd66d3bc696c3c4ffd

  • C:\Windows\SysWOW64\Soug.ime

    Filesize

    52KB

    MD5

    b60da4e2e5aceba3ce3d87ee2cd872ee

    SHA1

    9bbdbf1f3ce2c000a86e0473da756a4b1031db41

    SHA256

    b581fcc82c0462d60286a80912ab2ce5aca7d7b11c5cff0b5f74716dbb7dc453

    SHA512

    664d6f893484252b339ff8f413a4cf9da9b0ef82ed74b097ba86a5f00b4d9740eef6e8a5b81e8be7e82ae4009928097baf15e65a03f31c4b92e44f593ce39874

  • \??\c:\program files (x86)\xtuv\dtuvwxyab.jpg

    Filesize

    13.9MB

    MD5

    3db8eaa2997abd06b36e325461881d11

    SHA1

    9497b2019daf74dc6a451678c629defb4b62120d

    SHA256

    968a981a318c4d0771188720c4af9fa5ee96101dae1cd2e7af8ad782877acf24

    SHA512

    b9cf851034734fe518a19dcd9e55b117546bc7dd1c452ac4997571978123710ec68ad8dfdf0602dbf360297a1f75bf9c1d2af97a80303d54330286786ee837f2

  • memory/1132-1-0x0000000000400000-0x00000000007A9000-memory.dmp

    Filesize

    3.7MB

  • memory/1132-0-0x0000000000400000-0x00000000007A9000-memory.dmp

    Filesize

    3.7MB

  • memory/1132-163-0x0000000000400000-0x00000000007A9000-memory.dmp

    Filesize

    3.7MB