Analysis
-
max time kernel
137s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 04:04
Behavioral task
behavioral1
Sample
52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe
-
Size
144KB
-
MD5
52f4cc475bb2d26643911e24a0fbcd2e
-
SHA1
daa56e8f913a0e7fd100b9352bc493185b836205
-
SHA256
33b840aad4985d882b0c3f693b2f809b6f90f3ad5824db70f8721ade9befe1f2
-
SHA512
6f75fdd9c471f7287d8a8d62944c5b6e6f7458b3309b12b5062240d45bb3cbd40512f3c48b1dc0e0b8c12f9929daa69e5c6f1d67cf36dfbafd99ef25f6cf2e24
-
SSDEEP
3072:jCsYL2yBf6l7T93e4qht2Axc1ejihAyuRfGo3J5db5l:fhyae4St2w7OZ+/Xr
Malware Config
Extracted
gh0strat
aiac.f3322.net
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023417-3.dat family_gh0strat behavioral2/memory/1516-6-0x0000000000400000-0x0000000000450000-memory.dmp family_gh0strat -
RunningRat
RunningRat is a remote access trojan first seen in 2018.
-
RunningRat payload 1 IoCs
resource yara_rule behavioral2/memory/1516-1-0x0000000000400000-0x0000000000450000-memory.dmp family_runningrat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\CertPropSvc\Parameters\ServiceDll = "C:\\Program Files (x86)\\Google\\240599546.dll" 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1516 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1516-0-0x0000000000400000-0x0000000000450000-memory.dmp vmprotect behavioral2/memory/1516-1-0x0000000000400000-0x0000000000450000-memory.dmp vmprotect behavioral2/memory/1516-6-0x0000000000400000-0x0000000000450000-memory.dmp vmprotect -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Google\240599546.dll 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4964 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1516 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe 1516 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1516 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1516 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1516 wrote to memory of 2620 1516 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe 82 PID 1516 wrote to memory of 2620 1516 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe 82 PID 1516 wrote to memory of 2620 1516 52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe 82 PID 2620 wrote to memory of 4964 2620 cmd.exe 84 PID 2620 wrote to memory of 4964 2620 cmd.exe 84 PID 2620 wrote to memory of 4964 2620 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe"1⤵
- Sets DLL path for service in the registry
- Checks computer location settings
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\Admin\AppData\Local\Temp\52f4cc475bb2d26643911e24a0fbcd2e_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 13⤵
- Runs ping.exe
PID:4964
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5b623304c1ab787882a5e69709bb2adfb
SHA102f3d53e8fce05f3fcc8157d392dd4d18ef91754
SHA256fc2a35e4937b24ec62d9aa7a437b690ea907111722fdbf7f12d3e9a0a4fc46c7
SHA5123f08b3e8555c44ee2376e6d386e1b5bd6faaa64f2d480eb7459ca24cdafb31d1d3e4b83c3d16da99c31d1bca8f1ab273514afe551558a5d85998495e522aefd2