Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/03/2025, 11:19
Behavioral task
behavioral1
Sample
JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe
-
Size
148KB
-
MD5
64f37b627cfb958ca6ec41a6dbea4ecd
-
SHA1
f77591b61c47dcb081f485c68113b28e494b43b2
-
SHA256
a7ab175570c31186f5f64e5940701d831225fe87f556968fd8db29f330da6462
-
SHA512
40b2dea7fad423584fcdbf945760c2e681f1113fcb39c2e60ca74a56244a50cb2aaeb1108ee7c0bf606d18f3607df4e25ccec87d7ca650c492a60034e7b6af09
-
SSDEEP
3072:ynPq548DY50gePA/UHMd77OUKa+fB5dnUNSYVsqWaSN7hB3Zc:yPq5v/PY8YOUPG5x+Sasq4phFZc
Malware Config
Signatures
-
Gh0st RAT payload 6 IoCs
resource yara_rule behavioral1/files/0x0007000000012117-1.dat family_gh0strat behavioral1/memory/2652-7-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat behavioral1/memory/1796-8-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat behavioral1/memory/2656-9-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat behavioral1/memory/2656-13-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat behavioral1/memory/2656-19-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FreeRats\Parameters\ServiceDll = "C:\\Windows\\system32\\FreeRats.dll" rundll32.exe -
Deletes itself 1 IoCs
pid Process 2496 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1796 JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat svchost.exe File opened for modification C:\Windows\SysWOW64\FreeRats.ini JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1796 JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1796 wrote to memory of 2652 1796 JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe 30 PID 1796 wrote to memory of 2652 1796 JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe 30 PID 1796 wrote to memory of 2652 1796 JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe 30 PID 1796 wrote to memory of 2652 1796 JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe 30 PID 1796 wrote to memory of 2652 1796 JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe 30 PID 1796 wrote to memory of 2652 1796 JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe 30 PID 1796 wrote to memory of 2652 1796 JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe 30 PID 1796 wrote to memory of 2496 1796 JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe 33 PID 1796 wrote to memory of 2496 1796 JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe 33 PID 1796 wrote to memory of 2496 1796 JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe 33 PID 1796 wrote to memory of 2496 1796 JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64f37b627cfb958ca6ec41a6dbea4ecd.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\FreeRats.dll setup2⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
PID:2652
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2496
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD585993711a184f383b950db19671239ef
SHA186afd6c7a561667793816210332d3046af41a7cd
SHA256962197dc14ae32ec4955808c6224f730fe45eb934166d5170e2de697fbd32367
SHA512035e55c16478002f294e91e2406c05f6c5b7bef3efcb021b41794eb3c01d1e612e065513f3f525f9934fbabad031747a335903e81e8c7919f3e568e7775dbed6