Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 07:22
Behavioral task
behavioral1
Sample
JaffaCakes118_63f549b381765c6162c47fddf6674f89.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_63f549b381765c6162c47fddf6674f89.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_63f549b381765c6162c47fddf6674f89.exe
-
Size
107KB
-
MD5
63f549b381765c6162c47fddf6674f89
-
SHA1
127b730df411975ddfa1855e7962311f00c66f15
-
SHA256
abf2b4c003fd7ef2cd172fb1deeff8f9dfa152b1ba3822832fb042d0d02046b6
-
SHA512
e2de88793d43f3ddea3d748a50bfd4f4b22e28155b9bc2686b6056d770bfe6175a87888add3da7c02be842432afa12d10e91ad1927dd44d546ca69ac52b3bba7
-
SSDEEP
3072:S406SyKXCZuvoj3/P2B+Wu4BtP7dRcEHMrh:S4tSyKygQjWBJdvP7DcEw
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/2644-0-0x0000000000010000-0x000000000002C000-memory.dmp family_gh0strat behavioral2/files/0x0009000000023c5f-5.dat family_gh0strat behavioral2/memory/2644-6-0x0000000000010000-0x000000000002C000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\qqFastUserSwitchingCompatibilitycc.dll" JaffaCakes118_63f549b381765c6162c47fddf6674f89.exe -
Deletes itself 1 IoCs
pid Process 3812 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 3812 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\qqFastUserSwitchingCompatibilitycc.dll JaffaCakes118_63f549b381765c6162c47fddf6674f89.exe File created C:\Windows\SysWOW64\sysfzlog.dll JaffaCakes118_63f549b381765c6162c47fddf6674f89.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_63f549b381765c6162c47fddf6674f89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2644 JaffaCakes118_63f549b381765c6162c47fddf6674f89.exe 2644 JaffaCakes118_63f549b381765c6162c47fddf6674f89.exe 2644 JaffaCakes118_63f549b381765c6162c47fddf6674f89.exe 2644 JaffaCakes118_63f549b381765c6162c47fddf6674f89.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63f549b381765c6162c47fddf6674f89.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63f549b381765c6162c47fddf6674f89.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5e476f03fa3278665a3f5b66e6c12e989
SHA1030874386c01c47f61572a277bf98fef65deb3d2
SHA2565e9507b7df617ec7f3cbe2f3e86da990c6272f16d40e0d2437ea891657f13bbb
SHA512aebb8ab0955ae91570e3dfb0d8d75ab6b155a0e027c5c74ed11ec969ba6576294ede369ef700a8eee76b71f9a894039933b83a2c69f2ae1658aebc2a48582fa8