Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 18:15
Behavioral task
behavioral1
Sample
JaffaCakes118_66a3465502ceef6514b81cda65af97ea.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_66a3465502ceef6514b81cda65af97ea.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
20118404441.exe
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
20118404441.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_66a3465502ceef6514b81cda65af97ea.exe
-
Size
88KB
-
MD5
66a3465502ceef6514b81cda65af97ea
-
SHA1
dbbd91bd4f5d6dceb9c9fcb7a2cfe37033679fc6
-
SHA256
7ab5a4963454c799cc1149b38d9b26fa816cfdf938169879b431723f863a44d1
-
SHA512
60a0fee518ea398651f232e76e668b2dc09d83cfe6a14cc83bcfb873c318e35bee47ec4ba3d3f68991d5baa41fb8a621d662fc87fc6de60a3df5cb2701bb31b3
-
SSDEEP
1536:ALXB65939tY6HBg4sXJXivNF3NT9672dY7LVF3+PwiFqIbdwV4HRwBxya:ALk395hYXJyFpVSTz+NdwyRQca
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0012000000023a86-4.dat family_gh0strat -
Gh0strat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation JaffaCakes118_66a3465502ceef6514b81cda65af97ea.exe -
Executes dropped EXE 1 IoCs
pid Process 2004 20118404441.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "RUNDLL32 C:\\Program Files\\Common Files\\WINSOCK.INI,MJ001" 20118404441.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\MJ001.INI 20118404441.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_66a3465502ceef6514b81cda65af97ea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20118404441.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4156 wrote to memory of 2004 4156 JaffaCakes118_66a3465502ceef6514b81cda65af97ea.exe 87 PID 4156 wrote to memory of 2004 4156 JaffaCakes118_66a3465502ceef6514b81cda65af97ea.exe 87 PID 4156 wrote to memory of 2004 4156 JaffaCakes118_66a3465502ceef6514b81cda65af97ea.exe 87 PID 2004 wrote to memory of 1692 2004 20118404441.exe 88 PID 2004 wrote to memory of 1692 2004 20118404441.exe 88 PID 2004 wrote to memory of 1692 2004 20118404441.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_66a3465502ceef6514b81cda65af97ea.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_66a3465502ceef6514b81cda65af97ea.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\temp\20118404441.exe"C:\Windows\temp\20118404441.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Program Files\MJ001.INI",MJ0013⤵
- System Location Discovery: System Language Discovery
PID:1692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD576d4be5325ab30c36a17d59058a49784
SHA194c9e0f84cebe4f418c0e9fd968f8e4b7d5ff300
SHA25615a152afd9e625e11962c53a7a2c67777df7b5f313d1d22f9f16888f41618328
SHA51275f5ce2b0f65755f93fd9d50121c172e209597d781c5b6ec020b2593ec9654f3199e243df5c8c5c5d23daa00fba4e42e186e5ff0e80b9c7c4ca156dae7fee55d