Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 15:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe
-
Size
111KB
-
MD5
6611895adab443cc10616592e6aa9f11
-
SHA1
926289912c3854df625a056600c6a156c04f2a0f
-
SHA256
e69bb1b7df3ce22868df76038407b306cda9cd9a06ad78defc288ea535c0f834
-
SHA512
af26031a237c54a139bd13fdc98c7faf0d0cf9445061d4c1398da59759f1d4ce05878715e15fc659eae0237f1890f7081b8b86da9e869aee9bcdb93189057503
-
SSDEEP
3072:cFQwQhEOLfuDg0PtOqzKONqsEykRLSePQLKl:cNOFStZzKqqsE6ea
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/memory/1852-4-0x0000000010000000-0x000000001003B000-memory.dmp family_gh0strat behavioral2/memory/1852-3-0x0000000010000000-0x000000001003B000-memory.dmp family_gh0strat behavioral2/memory/1852-2-0x0000000010000000-0x000000001003B000-memory.dmp family_gh0strat behavioral2/memory/1852-5-0x0000000010000000-0x000000001003B000-memory.dmp family_gh0strat -
Gh0strat family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\C8971EE8 = "C:\\Windows\\C8971EE8\\svchsot.exe" JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe -
resource yara_rule behavioral2/memory/1852-0-0x0000000010000000-0x000000001003B000-memory.dmp upx behavioral2/memory/1852-4-0x0000000010000000-0x000000001003B000-memory.dmp upx behavioral2/memory/1852-3-0x0000000010000000-0x000000001003B000-memory.dmp upx behavioral2/memory/1852-2-0x0000000010000000-0x000000001003B000-memory.dmp upx behavioral2/memory/1852-5-0x0000000010000000-0x000000001003B000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\C8971EE8\svchsot.exe JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe File opened for modification C:\Windows\C8971EE8\svchsot.exe JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4156 1852 WerFault.exe 85 2468 1852 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe -
System Service Discovery 1 TTPs 2 IoCs
Adversaries may try to gather information about registered local system services.
pid Process 4344 net.exe 3416 net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1852 JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe 1852 JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe 1852 JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe 1852 JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe 1852 JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe 1852 JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1852 JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe Token: SeDebugPrivilege 1852 JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1852 wrote to memory of 4344 1852 JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe 88 PID 1852 wrote to memory of 4344 1852 JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe 88 PID 1852 wrote to memory of 4344 1852 JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe 88 PID 4344 wrote to memory of 3416 4344 net.exe 90 PID 4344 wrote to memory of 3416 4344 net.exe 90 PID 4344 wrote to memory of 3416 4344 net.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6611895adab443cc10616592e6aa9f11.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- System Location Discovery: System Language Discovery
- System Service Discovery
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵
- System Location Discovery: System Language Discovery
- System Service Discovery
PID:3416
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 6042⤵
- Program crash
PID:4156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 6122⤵
- Program crash
PID:2468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1852 -ip 18521⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1852 -ip 18521⤵PID:412