Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 10:39
Behavioral task
behavioral1
Sample
f7d241943e9cbac7826004030dae544c_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f7d241943e9cbac7826004030dae544c_JaffaCakes118.exe
-
Size
110KB
-
MD5
f7d241943e9cbac7826004030dae544c
-
SHA1
90901a8ff22e77f0364ed448693899719155519d
-
SHA256
7609528360031e059e3b8e844fe52c0ca63f3a24265df3c6e7cb693a9b184565
-
SHA512
c253c9607a01e7f59d6799a313d73475b604e2d35059fd79a12042351a03c93deef75f7770366262a8a710c9e0f0727813720f10adfc7eff41b2ce81dfd693c2
-
SSDEEP
3072:MwMRjDPFSyBDuG+zw01R9P6MDwMFBAKsg9uYwbh7yHpq5X:b8jDdSyBCG6w01+pG6ojwbRyHpm
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/1948-0-0x0000000000400000-0x000000000041D000-memory.dmp family_gh0strat behavioral1/files/0x000b00000001224f-5.dat family_gh0strat behavioral1/memory/1948-6-0x0000000000400000-0x000000000041D000-memory.dmp family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibilityno.dll" f7d241943e9cbac7826004030dae544c_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2204 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2204 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibilityno.dll f7d241943e9cbac7826004030dae544c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1948 f7d241943e9cbac7826004030dae544c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7d241943e9cbac7826004030dae544c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7d241943e9cbac7826004030dae544c_JaffaCakes118.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Deletes itself
- Loads dropped DLL
PID:2204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5fbc290ede46b7aefeafe097a2cfa1092
SHA117f458ea4625351ca5aa3d559618ad49b1107472
SHA256e373b95681382f586f43a0446f52f2d4860236a4d5ebfae63bcd8551b5dcf684
SHA5123a21eaf86597e8d59beb2017430c394f980cb2c977dafea3ef6db3c27854b7a5c38f63fb7bcb4100441ccaacaeeec55a32426f47821ff100c8de1dbf32e0e672