Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 06:50
Behavioral task
behavioral1
Sample
JaffaCakes118_63d0c68de4464ac1ba41f3ca63274187.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_63d0c68de4464ac1ba41f3ca63274187.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_63d0c68de4464ac1ba41f3ca63274187.exe
-
Size
113KB
-
MD5
63d0c68de4464ac1ba41f3ca63274187
-
SHA1
9a7907d6bcc854c9b80f826bf231603ad06a3e53
-
SHA256
293309d8c6907eb21bf1e82d15a231de1f31f359c693adb4c0cddd6d1b539d63
-
SHA512
8fc0ff8efdb6aa282d580f22d7ee3c5406cb640c784abf0d1b6c5771248e326e2a7876ed43a5eb6b97a709c9a009c92dbdbad5b7f8cdebe8492a4d52b3091917
-
SSDEEP
3072:BpoE5A2eWcKBLWjfTiiLeTd8OwXCHmCGGNZFx:B562f4HiwKd8OwSHm+ZF
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023bbe-0.dat family_gh0strat -
Gh0strat family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\iphook.sys JaffaCakes118_63d0c68de4464ac1ba41f3ca63274187.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\01731\Parameters\ServiceDll = "C:\\Windows\\system32\\01731360.c" JaffaCakes118_63d0c68de4464ac1ba41f3ca63274187.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\01731\ImagePath = "%SystemRoot%\\system32\\svchost -k 01731" JaffaCakes118_63d0c68de4464ac1ba41f3ca63274187.exe -
Deletes itself 1 IoCs
pid Process 1896 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1896 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\01731360.c JaffaCakes118_63d0c68de4464ac1ba41f3ca63274187.exe File created C:\Windows\SysWOW64\xitupinf.dat svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_63d0c68de4464ac1ba41f3ca63274187.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63d0c68de4464ac1ba41f3ca63274187.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63d0c68de4464ac1ba41f3ca63274187.exe"1⤵
- Drops file in Drivers directory
- Server Software Component: Terminal Services DLL
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3632
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost -k 01731 -s 017311⤵
- Deletes itself
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5849119713b320644f470c7cb686e18a2
SHA12095c9879c82d7d404c7be750eaaae41b71cbf2e
SHA2565316f09321783afdaa942da4e3c38bcc0a439daf22e402d6a6f0aaf95b481116
SHA512565e22624b58f7ae700f3bf4ab0e41e449ad601a37746ddc7d397191e292977a77a40c559bc473547c4a2573e516700139d177b8b43ee9c7284e82bcd834e107