Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6228e0bddca6629b077ea340bd142f31.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_6228e0bddca6629b077ea340bd142f31.exe
-
Size
95KB
-
MD5
6228e0bddca6629b077ea340bd142f31
-
SHA1
2c03ff3ed68866a2829e1fa46570e0955a385225
-
SHA256
38d9dfa2cbab55f4d4f182dd68a85c941e26d6484fd3d1952c7ad81c37f53928
-
SHA512
3180a05f1ad6129fe1276a904795d08b759f9bf097af45a6a122f3c027e99ccfa9d1303365a84fd1cab9f71bc62f3969e0a06a972c30358f14d086513aa433e9
-
SSDEEP
1536:fHFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prnMW5mb5EOc:fxS4jHS8q/3nTzePCwNUh4E9nWbGOc
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/files/0x000400000001eb58-15.dat family_gh0strat behavioral2/memory/2496-17-0x0000000000400000-0x000000000044E348-memory.dmp family_gh0strat behavioral2/memory/1844-20-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/848-25-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/3548-30-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2496 fcsgbrouyx -
Executes dropped EXE 1 IoCs
pid Process 2496 fcsgbrouyx -
Loads dropped DLL 3 IoCs
pid Process 1844 svchost.exe 848 svchost.exe 3548 svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\vintocfcwv svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\vqcnwfiakr svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\vapgfikxwm svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 3308 1844 WerFault.exe 104 900 848 WerFault.exe 109 3444 3548 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6228e0bddca6629b077ea340bd142f31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcsgbrouyx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2496 fcsgbrouyx 2496 fcsgbrouyx -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 2496 fcsgbrouyx Token: SeBackupPrivilege 2496 fcsgbrouyx Token: SeBackupPrivilege 2496 fcsgbrouyx Token: SeRestorePrivilege 2496 fcsgbrouyx Token: SeBackupPrivilege 1844 svchost.exe Token: SeRestorePrivilege 1844 svchost.exe Token: SeBackupPrivilege 1844 svchost.exe Token: SeBackupPrivilege 1844 svchost.exe Token: SeSecurityPrivilege 1844 svchost.exe Token: SeSecurityPrivilege 1844 svchost.exe Token: SeBackupPrivilege 1844 svchost.exe Token: SeBackupPrivilege 1844 svchost.exe Token: SeSecurityPrivilege 1844 svchost.exe Token: SeBackupPrivilege 1844 svchost.exe Token: SeBackupPrivilege 1844 svchost.exe Token: SeSecurityPrivilege 1844 svchost.exe Token: SeBackupPrivilege 1844 svchost.exe Token: SeRestorePrivilege 1844 svchost.exe Token: SeBackupPrivilege 848 svchost.exe Token: SeRestorePrivilege 848 svchost.exe Token: SeBackupPrivilege 848 svchost.exe Token: SeBackupPrivilege 848 svchost.exe Token: SeSecurityPrivilege 848 svchost.exe Token: SeSecurityPrivilege 848 svchost.exe Token: SeBackupPrivilege 848 svchost.exe Token: SeBackupPrivilege 848 svchost.exe Token: SeSecurityPrivilege 848 svchost.exe Token: SeBackupPrivilege 848 svchost.exe Token: SeBackupPrivilege 848 svchost.exe Token: SeSecurityPrivilege 848 svchost.exe Token: SeBackupPrivilege 848 svchost.exe Token: SeRestorePrivilege 848 svchost.exe Token: SeBackupPrivilege 3548 svchost.exe Token: SeRestorePrivilege 3548 svchost.exe Token: SeBackupPrivilege 3548 svchost.exe Token: SeBackupPrivilege 3548 svchost.exe Token: SeSecurityPrivilege 3548 svchost.exe Token: SeSecurityPrivilege 3548 svchost.exe Token: SeBackupPrivilege 3548 svchost.exe Token: SeBackupPrivilege 3548 svchost.exe Token: SeSecurityPrivilege 3548 svchost.exe Token: SeBackupPrivilege 3548 svchost.exe Token: SeBackupPrivilege 3548 svchost.exe Token: SeSecurityPrivilege 3548 svchost.exe Token: SeBackupPrivilege 3548 svchost.exe Token: SeRestorePrivilege 3548 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2496 1216 JaffaCakes118_6228e0bddca6629b077ea340bd142f31.exe 92 PID 1216 wrote to memory of 2496 1216 JaffaCakes118_6228e0bddca6629b077ea340bd142f31.exe 92 PID 1216 wrote to memory of 2496 1216 JaffaCakes118_6228e0bddca6629b077ea340bd142f31.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6228e0bddca6629b077ea340bd142f31.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6228e0bddca6629b077ea340bd142f31.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1216 -
\??\c:\users\admin\appdata\local\fcsgbrouyx"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6228e0bddca6629b077ea340bd142f31.exe" a -sc:\users\admin\appdata\local\temp\jaffacakes118_6228e0bddca6629b077ea340bd142f31.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 10402⤵
- Program crash
PID:3308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1844 -ip 18441⤵PID:1884
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 11122⤵
- Program crash
PID:900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 848 -ip 8481⤵PID:2712
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 10602⤵
- Program crash
PID:3444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3548 -ip 35481⤵PID:3592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22.8MB
MD532951035bb6be446e5f3ad7cb911b70a
SHA171d445f31dc37ebd28bec751d93792e3012eccf7
SHA256e5b74b17ec55e599a66fcb0c85fe2f6dc28351c60fb108ce15ce1e4a90c1164e
SHA512a80462da21646f76b12d6ff176647af6ceb7bdb8c39ee03d5ed344693ee06f4fc943ca55f5045bc7f1779e90f358c743687636682e7ef8ad77d60d55f652ba5a
-
Filesize
202B
MD55dc0b7fcba5abd09d89adb31946d038d
SHA1c5873a0b2259e65d7d9198549f329f3f1c9c93b2
SHA256165a1f1b619124d0bc88a0cf23bda5c9e4d27cf43315da2e3cf727b2988beb52
SHA51289287feb0455cbdcbda46401efb0cd03eea4952d6ce49a30988bda78e379d1e87c14d12c4d8cd0801307a406759076d9c81f6d73be085e165500da8548bc1b4d
-
Filesize
261B
MD5a48f59fdb1da58b7327e39e2975d52da
SHA1fc4c58102fe0c0df94fb606c84982a19d06da918
SHA256fdc9fee6275190cbc96490cf1c6c4a1ffd59f7f97d3ff32cb6054171b63d93e8
SHA512bb06f658ccc5a5688e4fec35f3663a02afb8ed0c67a0fb93d04102a44558a9be08d117a5cb2c8c9dd9b9e7539f8f3bc34ad99ba7718cb9f6c46c9a2b8e15264c
-
Filesize
19.0MB
MD50052dda3b861aeac320b07460555ee28
SHA1bee949471f89e02b4fc4fbe7af375770b62ac6a5
SHA256b12430c6e3dc1832ec7512cbcda0a36fb75f821af1d22fbb56d0e3d453cb813a
SHA5123410cc3eac7b1c4fcf8740d28f84221feb43d73e052cbe27f8d9768ca931d21f1f73d5b1fe34bb0b9f714b6a2e3acfd7215537f8ac6da2d76d269142f5dbbe7c