Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 04:04
Behavioral task
behavioral1
Sample
52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe
-
Size
144KB
-
MD5
52f4cc475bb2d26643911e24a0fbcd2e
-
SHA1
daa56e8f913a0e7fd100b9352bc493185b836205
-
SHA256
33b840aad4985d882b0c3f693b2f809b6f90f3ad5824db70f8721ade9befe1f2
-
SHA512
6f75fdd9c471f7287d8a8d62944c5b6e6f7458b3309b12b5062240d45bb3cbd40512f3c48b1dc0e0b8c12f9929daa69e5c6f1d67cf36dfbafd99ef25f6cf2e24
-
SSDEEP
3072:jCsYL2yBf6l7T93e4qht2Axc1ejihAyuRfGo3J5db5l:fhyae4St2w7OZ+/Xr
Malware Config
Extracted
gh0strat
aiac.f3322.net
Signatures
-
Gh0st RAT payload 2 IoCs
Processes:
resource yara_rule \Program Files (x86)\Google\259401457.dll family_gh0strat behavioral1/memory/2064-5-0x0000000000400000-0x0000000000450000-memory.dmp family_gh0strat -
RunningRat
RunningRat is a remote access trojan first seen in 2018.
-
RunningRat payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2064-1-0x0000000000400000-0x0000000000450000-memory.dmp family_runningrat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\CertPropSvc\Parameters\ServiceDll = "C:\\Program Files (x86)\\Google\\259401457.dll" 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2892 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exepid process 2064 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/memory/2064-0-0x0000000000400000-0x0000000000450000-memory.dmp vmprotect behavioral1/memory/2064-1-0x0000000000400000-0x0000000000450000-memory.dmp vmprotect behavioral1/memory/2064-5-0x0000000000400000-0x0000000000450000-memory.dmp vmprotect -
Drops file in Program Files directory 1 IoCs
Processes:
52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exedescription ioc process File created C:\Program Files (x86)\Google\259401457.dll 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exepid process 2064 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exedescription pid process Token: SeIncBasePriorityPrivilege 2064 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exepid process 2064 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.execmd.exedescription pid process target process PID 2064 wrote to memory of 2892 2064 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe cmd.exe PID 2064 wrote to memory of 2892 2064 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe cmd.exe PID 2064 wrote to memory of 2892 2064 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe cmd.exe PID 2064 wrote to memory of 2892 2064 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe cmd.exe PID 2892 wrote to memory of 2920 2892 cmd.exe PING.EXE PID 2892 wrote to memory of 2920 2892 cmd.exe PING.EXE PID 2892 wrote to memory of 2920 2892 cmd.exe PING.EXE PID 2892 wrote to memory of 2920 2892 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe"1⤵
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\Admin\AppData\Local\Temp\52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 13⤵
- Runs ping.exe
PID:2920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5b623304c1ab787882a5e69709bb2adfb
SHA102f3d53e8fce05f3fcc8157d392dd4d18ef91754
SHA256fc2a35e4937b24ec62d9aa7a437b690ea907111722fdbf7f12d3e9a0a4fc46c7
SHA5123f08b3e8555c44ee2376e6d386e1b5bd6faaa64f2d480eb7459ca24cdafb31d1d3e4b83c3d16da99c31d1bca8f1ab273514afe551558a5d85998495e522aefd2