Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/03/2025, 11:33
Behavioral task
behavioral1
Sample
JaffaCakes118_65045c71cd504a22e5d77e4f82f9ce9a.dll
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
JaffaCakes118_65045c71cd504a22e5d77e4f82f9ce9a.dll
-
Size
105KB
-
MD5
65045c71cd504a22e5d77e4f82f9ce9a
-
SHA1
b913251e49a9349e2b97935c53c56b54b875ee58
-
SHA256
e24ea9b7682ab2f23190bb0d02e6ba22d53e47e035dc629d0d24362811b7a88c
-
SHA512
be687f8dacd93c5dc71a82a1ac44f0b58c13a5443286e423bfb84a41d4b050b3902e5628014a7576ffe067459086f716ddfe58b8daf5975f20558f7cbdc47145
-
SSDEEP
3072:A9reS2CiIhJUIxdldNIX/R8/C4sJJ4Hb:mreSCIhJxxdByRmSJJ
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2244-0-0x0000000010000000-0x000000001001D000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2244 2188 rundll32.exe 30 PID 2188 wrote to memory of 2244 2188 rundll32.exe 30 PID 2188 wrote to memory of 2244 2188 rundll32.exe 30 PID 2188 wrote to memory of 2244 2188 rundll32.exe 30 PID 2188 wrote to memory of 2244 2188 rundll32.exe 30 PID 2188 wrote to memory of 2244 2188 rundll32.exe 30 PID 2188 wrote to memory of 2244 2188 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_65045c71cd504a22e5d77e4f82f9ce9a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_65045c71cd504a22e5d77e4f82f9ce9a.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2244
-