Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 15:07

General

  • Target

    093aafb3a64ce1c2ce77dbafc2743832_JaffaCakes118.exe

  • Size

    229KB

  • MD5

    093aafb3a64ce1c2ce77dbafc2743832

  • SHA1

    99a4be3d97037e622d552f6677fe44e887f130e2

  • SHA256

    fa02a554ded15356c78d6eb8ec5fc24efa30d46e1f535cfc639607eecd3c2735

  • SHA512

    a547472430b0100d038870f653e697eef488a127833da6072ed4025d603631523c3830ccfb942168acd49e498cd221b62026feb31bf8f0c7e1d87bc9f3d59297

  • SSDEEP

    6144:YFYHOoTSCCcJGDtjuDJvdTSCCcJG9tjuHJv5:OE7CcYDodh7CcY9oph

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\093aafb3a64ce1c2ce77dbafc2743832_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\093aafb3a64ce1c2ce77dbafc2743832_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Suspicious behavior: EnumeratesProcesses
    PID:1808
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Deletes itself
    • Loads dropped DLL
    PID:4392

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \??\c:\documents and settings\local user\xpuser.dll

          Filesize

          106KB

          MD5

          5d3c51101a88997ab603728c9e3418c1

          SHA1

          43807e0a082119e86e91271715ca862e46ca58d9

          SHA256

          2aeff5a6fabe7dd19b1161f870ce26ec50e8f75f7e62df7ffd5e6affb4816cc2

          SHA512

          bff753109457582b12ab756012e256d63d61c11e5c585539d2c4604663238870ee9d120f6148afba0bd93b36aa2a2067d8a0d842815814b38494c12d4a4a3b1e

        • memory/1808-0-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/1808-3-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/4392-5-0x0000000010000000-0x000000001001D000-memory.dmp

          Filesize

          116KB