Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 04:57
Behavioral task
behavioral1
Sample
JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe
-
Size
120KB
-
MD5
635331cf1d1cb5fca3bf38eb5474161d
-
SHA1
c12cba8301532c5482fd48c4a8024073371a816b
-
SHA256
cd927b9524e76119c5dc6aa14b514b139acdabbff28d8ad157d0199a2828a404
-
SHA512
4eeb86fdc5118d98c4487f149d9a7b662f47d571e8bdc5cc96eff3404b888c10a91365a2dbabce7f14b9029a90b6f02d25d993901c575ca3d10be34e5d642ac2
-
SSDEEP
3072:SdywFltigc3kQEt0NbW8IizUwj/KKN7M4EvL:SdyuYkftm3Iod/KKBM4C
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023c4b-26.dat family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QORSVPdoe\Parameters\ServiceDll JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe -
Loads dropped DLL 3 IoCs
pid Process 4736 JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe 1572 svchost.exe 1016 rundll32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\wi240630546nd.temp JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe File created C:\Program Files (x86)\wi240630578nd.temp JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\MySomeInfo.ini JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe File created C:\Windows\HowArMe.txt JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe File created C:\Windows\HowArMe.reg JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4736 JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe 4736 JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe 4736 JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe 4736 JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe 4736 JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe 4736 JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe 4736 JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe 4736 JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 4736 JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe Token: SeRestorePrivilege 4736 JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe Token: SeDebugPrivilege 1572 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1572 wrote to memory of 1016 1572 svchost.exe 91 PID 1572 wrote to memory of 1016 1572 svchost.exe 91 PID 1572 wrote to memory of 1016 1572 svchost.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_635331cf1d1cb5fca3bf38eb5474161d.exe"1⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\windows\system32\winsys.dll,CodeMain QORSVPdoe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20.0MB
MD54acf56d2080b0b9ea225ef69d526867a
SHA1bb436f9e0c5d511b43df9232fc5f4945cf49db58
SHA256cbc4156d1ee4de328144ac83a0053258ff593e1eb9782cd31e1e17df1bf7eaa7
SHA5124c07e567a6d89869c2de7027140149fb8198957a971c51970f2b45c8dff1faba6d2c86011ec3ccffda183c25537172950f51e534ad7094fa1ed3c0f441a8615a
-
Filesize
373B
MD57b5744134c9a6d1a439803f059965b91
SHA10ffcb81547211b1deb3727f3d6bc8c8f78d1aa23
SHA256bc78726e6aecbcb6fb4838666b2d6a01d2acde7eef8dc1d95fddca833d1d9559
SHA5126ed46381cdb868820f78de5b37c1703c0892dc6ca4612734b64e0a26bc8a3567ccf2e2315602f698b7ea1bfe59c7b9a4ab79fe8320f7efbb3380819d5ce683c5
-
Filesize
20.1MB
MD5c95ef68061e65d0656fc6e955445ddab
SHA1e9ae69e4653b48e16b9e6a9663decb5d0f264dc8
SHA25606075e982cb8c2a360701e64959e23598401e91818828a4d9f0ee92a9ba8227c
SHA51232fe8d51e9445cddf07da62936a115e83ed52809c3b68a89c28ce48e180a78225c519b9f6c1445b3086040927d1c7e39f44b4f25965371e94b472095a5089acd