Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 03:47
Static task
static1
Behavioral task
behavioral1
Sample
fe5ae51a975c574691bb439e36d0a25c2ae64888fa2bd83d179a43b86e5dc2e8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe5ae51a975c574691bb439e36d0a25c2ae64888fa2bd83d179a43b86e5dc2e8_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fe5ae51a975c574691bb439e36d0a25c2ae64888fa2bd83d179a43b86e5dc2e8_JaffaCakes118.exe
-
Size
572KB
-
MD5
95e5ca72df58cefa481b6b360bf7d5d3
-
SHA1
7a1ae2e8a75d01e269de4c2ad6067a4146593aac
-
SHA256
fe5ae51a975c574691bb439e36d0a25c2ae64888fa2bd83d179a43b86e5dc2e8
-
SHA512
2f04dedd6c10e02e01530f2055545550c1740c754eec26010e2009c3239315d120b420e5eaf3c42d22f75a1143a2027363370abde0afb686f2722f9a358288c5
-
SSDEEP
6144:iV+u0bUDMT2EDFjj4bflswu/jtLFVgT/WOfrtNswrEH7fYP7cQKO+3Y1tMmbWs:Ob3MKbflsw0t5VgLWYtHraOz+3Y12wW
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/memory/4028-3-0x0000000010000000-0x000000001003C000-memory.dmp family_gh0strat behavioral2/memory/4028-2-0x0000000010000000-0x000000001003C000-memory.dmp family_gh0strat behavioral2/memory/4028-5-0x0000000010000000-0x000000001003C000-memory.dmp family_gh0strat behavioral2/memory/4028-6-0x0000000010000000-0x000000001003C000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaster = "C:\\WINDOWS\\svchost.exe" fe5ae51a975c574691bb439e36d0a25c2ae64888fa2bd83d179a43b86e5dc2e8_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\svchost.exe fe5ae51a975c574691bb439e36d0a25c2ae64888fa2bd83d179a43b86e5dc2e8_JaffaCakes118.exe File opened for modification C:\WINDOWS\svchost.exe fe5ae51a975c574691bb439e36d0a25c2ae64888fa2bd83d179a43b86e5dc2e8_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4028 fe5ae51a975c574691bb439e36d0a25c2ae64888fa2bd83d179a43b86e5dc2e8_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4028 fe5ae51a975c574691bb439e36d0a25c2ae64888fa2bd83d179a43b86e5dc2e8_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe5ae51a975c574691bb439e36d0a25c2ae64888fa2bd83d179a43b86e5dc2e8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe5ae51a975c574691bb439e36d0a25c2ae64888fa2bd83d179a43b86e5dc2e8_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:4028