Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 15:47
Behavioral task
behavioral1
Sample
faa2aa040d2ffa6410b70150f1dc6d84_JaffaCakes118.exe
Resource
win7-20231129-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
faa2aa040d2ffa6410b70150f1dc6d84_JaffaCakes118.exe
Resource
win10v2004-20240412-en
10 signatures
150 seconds
General
-
Target
faa2aa040d2ffa6410b70150f1dc6d84_JaffaCakes118.exe
-
Size
139KB
-
MD5
faa2aa040d2ffa6410b70150f1dc6d84
-
SHA1
b2917ef1d0aa19765508d3e0e68ae46f362d1f56
-
SHA256
23d32266a28618b9b48d16caaea55a540f64b17cb8a29597853af2557797a550
-
SHA512
0dd94c7cb336ff7609f6e39e5be9e95b60b84c6b7cf0437d132e1971c657920d1ba7da546249c26109dc1183b39d9ccbc2a456f794f42947c918fb06956f0b1e
-
SSDEEP
3072:AuNWdu3fymkDMAtwkhDwnCKOsiUFLZTO0FC+th:JWdTDXPun1TbY+th
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/memory/1652-5-0x0000000010000000-0x0000000010050000-memory.dmp family_gh0strat behavioral1/memory/1652-6-0x0000000010000000-0x0000000010050000-memory.dmp family_gh0strat behavioral1/memory/1652-8-0x0000000010000000-0x0000000010050000-memory.dmp family_gh0strat behavioral1/memory/1652-11-0x0000000010000000-0x0000000010050000-memory.dmp family_gh0strat -
resource yara_rule behavioral1/memory/1652-0-0x0000000000400000-0x0000000000445000-memory.dmp vmprotect behavioral1/memory/1652-1-0x0000000000400000-0x0000000000445000-memory.dmp vmprotect behavioral1/memory/1652-12-0x0000000000400000-0x0000000000445000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\8783B7D1 = "C:\\Windows\\8783B7D1\\svchsot.exe" faa2aa040d2ffa6410b70150f1dc6d84_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\8783B7D1\svchsot.exe faa2aa040d2ffa6410b70150f1dc6d84_JaffaCakes118.exe File opened for modification C:\Windows\8783B7D1\svchsot.exe faa2aa040d2ffa6410b70150f1dc6d84_JaffaCakes118.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1652 faa2aa040d2ffa6410b70150f1dc6d84_JaffaCakes118.exe 1652 faa2aa040d2ffa6410b70150f1dc6d84_JaffaCakes118.exe 1652 faa2aa040d2ffa6410b70150f1dc6d84_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1652 faa2aa040d2ffa6410b70150f1dc6d84_JaffaCakes118.exe Token: SeDebugPrivilege 1652 faa2aa040d2ffa6410b70150f1dc6d84_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1652 wrote to memory of 3060 1652 faa2aa040d2ffa6410b70150f1dc6d84_JaffaCakes118.exe 28 PID 1652 wrote to memory of 3060 1652 faa2aa040d2ffa6410b70150f1dc6d84_JaffaCakes118.exe 28 PID 1652 wrote to memory of 3060 1652 faa2aa040d2ffa6410b70150f1dc6d84_JaffaCakes118.exe 28 PID 1652 wrote to memory of 3060 1652 faa2aa040d2ffa6410b70150f1dc6d84_JaffaCakes118.exe 28 PID 3060 wrote to memory of 2156 3060 net.exe 30 PID 3060 wrote to memory of 2156 3060 net.exe 30 PID 3060 wrote to memory of 2156 3060 net.exe 30 PID 3060 wrote to memory of 2156 3060 net.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\faa2aa040d2ffa6410b70150f1dc6d84_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\faa2aa040d2ffa6410b70150f1dc6d84_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵PID:2156
-
-