Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 17:15
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_666acf75e9e8f9f26af284b6063ea4bc.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_666acf75e9e8f9f26af284b6063ea4bc.exe
-
Size
95KB
-
MD5
666acf75e9e8f9f26af284b6063ea4bc
-
SHA1
f5a56c49e480023553b32e3206a3603777bf965a
-
SHA256
820bfdeb6de172662d9d34b85e90f7913edea5595eeb3dc9358df757c02db5be
-
SHA512
cd9b6007ea44abb449344352a8a08dc30ab5ab371fd4c290cc957f88d54901bae86fb991dcfee63137ed42c57edfae2258aa51151838528ab5f00d0db7c8d33f
-
SSDEEP
1536:3a9zFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8pr8eEwN:3KNS4jHS8q/3nTzePCwNUh4E9VEwN
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/files/0x000500000001e96c-15.dat family_gh0strat behavioral2/memory/3188-17-0x0000000000400000-0x000000000044C605-memory.dmp family_gh0strat behavioral2/memory/1704-20-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/4708-25-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/4832-30-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 3188 hcykupibrd -
Executes dropped EXE 1 IoCs
pid Process 3188 hcykupibrd -
Loads dropped DLL 3 IoCs
pid Process 1704 svchost.exe 4708 svchost.exe 4832 svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\xwhlxhcxfs svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\xgfyhbwdfd svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\xotspeyarx svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 4424 1704 WerFault.exe 93 2692 4708 WerFault.exe 99 4980 4832 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_666acf75e9e8f9f26af284b6063ea4bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hcykupibrd Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3188 hcykupibrd 3188 hcykupibrd -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 3188 hcykupibrd Token: SeBackupPrivilege 3188 hcykupibrd Token: SeBackupPrivilege 3188 hcykupibrd Token: SeRestorePrivilege 3188 hcykupibrd Token: SeBackupPrivilege 1704 svchost.exe Token: SeRestorePrivilege 1704 svchost.exe Token: SeBackupPrivilege 1704 svchost.exe Token: SeBackupPrivilege 1704 svchost.exe Token: SeSecurityPrivilege 1704 svchost.exe Token: SeSecurityPrivilege 1704 svchost.exe Token: SeBackupPrivilege 1704 svchost.exe Token: SeBackupPrivilege 1704 svchost.exe Token: SeSecurityPrivilege 1704 svchost.exe Token: SeBackupPrivilege 1704 svchost.exe Token: SeBackupPrivilege 1704 svchost.exe Token: SeSecurityPrivilege 1704 svchost.exe Token: SeBackupPrivilege 1704 svchost.exe Token: SeRestorePrivilege 1704 svchost.exe Token: SeBackupPrivilege 4708 svchost.exe Token: SeRestorePrivilege 4708 svchost.exe Token: SeBackupPrivilege 4708 svchost.exe Token: SeBackupPrivilege 4708 svchost.exe Token: SeSecurityPrivilege 4708 svchost.exe Token: SeSecurityPrivilege 4708 svchost.exe Token: SeBackupPrivilege 4708 svchost.exe Token: SeBackupPrivilege 4708 svchost.exe Token: SeSecurityPrivilege 4708 svchost.exe Token: SeBackupPrivilege 4708 svchost.exe Token: SeBackupPrivilege 4708 svchost.exe Token: SeSecurityPrivilege 4708 svchost.exe Token: SeBackupPrivilege 4708 svchost.exe Token: SeRestorePrivilege 4708 svchost.exe Token: SeBackupPrivilege 4832 svchost.exe Token: SeRestorePrivilege 4832 svchost.exe Token: SeBackupPrivilege 4832 svchost.exe Token: SeBackupPrivilege 4832 svchost.exe Token: SeSecurityPrivilege 4832 svchost.exe Token: SeSecurityPrivilege 4832 svchost.exe Token: SeBackupPrivilege 4832 svchost.exe Token: SeBackupPrivilege 4832 svchost.exe Token: SeSecurityPrivilege 4832 svchost.exe Token: SeBackupPrivilege 4832 svchost.exe Token: SeBackupPrivilege 4832 svchost.exe Token: SeSecurityPrivilege 4832 svchost.exe Token: SeBackupPrivilege 4832 svchost.exe Token: SeRestorePrivilege 4832 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1628 wrote to memory of 3188 1628 JaffaCakes118_666acf75e9e8f9f26af284b6063ea4bc.exe 87 PID 1628 wrote to memory of 3188 1628 JaffaCakes118_666acf75e9e8f9f26af284b6063ea4bc.exe 87 PID 1628 wrote to memory of 3188 1628 JaffaCakes118_666acf75e9e8f9f26af284b6063ea4bc.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_666acf75e9e8f9f26af284b6063ea4bc.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_666acf75e9e8f9f26af284b6063ea4bc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
\??\c:\users\admin\appdata\local\hcykupibrd"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_666acf75e9e8f9f26af284b6063ea4bc.exe" a -sc:\users\admin\appdata\local\temp\jaffacakes118_666acf75e9e8f9f26af284b6063ea4bc.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3188
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 11042⤵
- Program crash
PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1704 -ip 17041⤵PID:3940
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 10282⤵
- Program crash
PID:2692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4708 -ip 47081⤵PID:1380
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 11042⤵
- Program crash
PID:4980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4832 -ip 48321⤵PID:2008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23.2MB
MD5e3f65e5bd10f40d9cf5b95f28a7db924
SHA16da77a40dbd24f0884a984808c269ace5484cc19
SHA256cb45046e03e4b4eaebc8732b6776ecfbc663f6348e823985d734f65057446c4b
SHA5121dbe9fd8f2e795d7a59a510ac1a475a5cdde0f65d7ce10669cc0d848b99b392b767792ef08aea5ee1746c6f2cfaf1a5d55cc7dfbd1b1036f7f91e2775922b367
-
Filesize
204B
MD5711f1d218a10b513bc8dda5a27f3de37
SHA1eebde90ab62e0c6ca496a0acfc3bc81a004cef18
SHA25673f2f455bdb65f2c82397b7d6a8fc2c86a27277a4cc20f8166b68e60447a3618
SHA5121d826039ecc9b0815127230c3fcf65a8944b0a879757231f18b07019b593b2e74e5ea3e32bb2a57824ea39f839f9a0b4b1e20d4f1573b9399868f9a6724fd70d
-
Filesize
306B
MD58b1eb9551268f511a8569a8cca516cc1
SHA168fdf52abe35c9bb72e84ca9d590d0e6f8ce7511
SHA256a1f07097801d370ed5c8591c6fe86a922d475a45b2f864539589fa0583b3e4dd
SHA512c2797b6598780222117b38cd5d090396a0348ab4409707bb30b3cdf9b475a679f6b3c9efd20f6ba745af894cd1d5d0b345d9853d8f5d074692bd59135cc9535a
-
Filesize
21.1MB
MD590e1afadaeb450afd49fff0e9f96bf58
SHA149d5a4908cb32a8c5badd5433e4271e8d2aa8a71
SHA256ca4dd708bd5214b61b192751e911c85204b68345537ba8f98b7aaab2079b6509
SHA5128edfcfdcf385de50c92696ecc506f9425465f863a43aea149a2474b5aa9fbab2f3c6f8e4124bd07b7d48953fda6438c592d20ef31f38ad32aae737b8bb32b225