Analysis

  • max time kernel
    151s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 12:39

General

  • Target

    060dcd2a0c040c300c9ef538000b81d7_JaffaCakes118.exe

  • Size

    887KB

  • MD5

    060dcd2a0c040c300c9ef538000b81d7

  • SHA1

    52fb68300a263210d3d713ed672433c198f7bbc4

  • SHA256

    e46fcc75c6fc774d83921d5151dc99dcd738b7b2442697cd268f7206abcedfba

  • SHA512

    b105bb98e92b6dff72e0f00cc028d0f5f3100a663fab796c81acb169e5b99bd0f2dff5b18eab28679ff61adb5f2b8502ff88f61efe738fd21648888d351343f0

  • SSDEEP

    12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZKsI:iM5j8Z3aKHx5r+TuxX+IwffFZKsI

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\060dcd2a0c040c300c9ef538000b81d7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\060dcd2a0c040c300c9ef538000b81d7_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2072
    • \??\c:\Windows\svchest001465662051.exe
      c:\Windows\svchest001465662051.exe
      2⤵
      • Executes dropped EXE
      PID:3028

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\svchest001465662051.exe

          Filesize

          887KB

          MD5

          060dcd2a0c040c300c9ef538000b81d7

          SHA1

          52fb68300a263210d3d713ed672433c198f7bbc4

          SHA256

          e46fcc75c6fc774d83921d5151dc99dcd738b7b2442697cd268f7206abcedfba

          SHA512

          b105bb98e92b6dff72e0f00cc028d0f5f3100a663fab796c81acb169e5b99bd0f2dff5b18eab28679ff61adb5f2b8502ff88f61efe738fd21648888d351343f0