Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 18:34
Behavioral task
behavioral1
Sample
08b0882cc4a817add98f079c448ed689_JaffaCakes118.exe
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
08b0882cc4a817add98f079c448ed689_JaffaCakes118.exe
Resource
win10v2004-20240508-en
4 signatures
150 seconds
General
-
Target
08b0882cc4a817add98f079c448ed689_JaffaCakes118.exe
-
Size
113KB
-
MD5
08b0882cc4a817add98f079c448ed689
-
SHA1
05a54cfc3415cd55856b6cf94607a03b0ba00f9e
-
SHA256
40017573875d16207e62b42cf16ee7c025bda173a94509cad0d4086515cd2f95
-
SHA512
45c340ae38131bb9d696295a8966abc89c7158bd85b480e325a04aff0dc339d786c7be38bf1d047b7f3061a39d4f88888cc75ea3c90574c4773c4bd6825f7623
-
SSDEEP
1536:kyISlD5ipATXcExz9erO50PXv5/FTpcdv5f6WEueiMcUCeWAT8U:USl1ia3xSjx/FTpKv56WEQMzCeWAT8
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1148-2-0x0000000000400000-0x000000000041C5B0-memory.dmp family_gh0strat -
Server Software Component: Terminal Services DLL 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\HidServ\Parameters\ServiceDll = "C:\\Windows\\system32\\helpsvc.dll" 08b0882cc4a817add98f079c448ed689_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\hidserv\Parameters\ServiceDll = "C:\\Windows\\system32\\helpsvc.dll" 08b0882cc4a817add98f079c448ed689_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\helpsvc.dll 08b0882cc4a817add98f079c448ed689_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08b0882cc4a817add98f079c448ed689_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08b0882cc4a817add98f079c448ed689_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
PID:1148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p1⤵PID:1676