Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 15:07
Behavioral task
behavioral1
Sample
093aafb3a64ce1c2ce77dbafc2743832_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
093aafb3a64ce1c2ce77dbafc2743832_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
093aafb3a64ce1c2ce77dbafc2743832_JaffaCakes118.exe
-
Size
229KB
-
MD5
093aafb3a64ce1c2ce77dbafc2743832
-
SHA1
99a4be3d97037e622d552f6677fe44e887f130e2
-
SHA256
fa02a554ded15356c78d6eb8ec5fc24efa30d46e1f535cfc639607eecd3c2735
-
SHA512
a547472430b0100d038870f653e697eef488a127833da6072ed4025d603631523c3830ccfb942168acd49e498cd221b62026feb31bf8f0c7e1d87bc9f3d59297
-
SSDEEP
6144:YFYHOoTSCCcJGDtjuDJvdTSCCcJG9tjuHJv5:OE7CcYDodh7CcY9oph
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/memory/1808-0-0x0000000000400000-0x000000000043B000-memory.dmp family_gh0strat behavioral2/memory/1808-3-0x0000000000400000-0x000000000043B000-memory.dmp family_gh0strat behavioral2/files/0x00080000000233e7-2.dat family_gh0strat behavioral2/memory/4392-5-0x0000000010000000-0x000000001001D000-memory.dmp family_gh0strat -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\360svc\Parameters\ServiceDll = "C:\\Documents and Settings\\Local User\\xpuser.dll" 093aafb3a64ce1c2ce77dbafc2743832_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 4392 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 4392 svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1808 093aafb3a64ce1c2ce77dbafc2743832_JaffaCakes118.exe 1808 093aafb3a64ce1c2ce77dbafc2743832_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\093aafb3a64ce1c2ce77dbafc2743832_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\093aafb3a64ce1c2ce77dbafc2743832_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Deletes itself
- Loads dropped DLL
PID:4392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD55d3c51101a88997ab603728c9e3418c1
SHA143807e0a082119e86e91271715ca862e46ca58d9
SHA2562aeff5a6fabe7dd19b1161f870ce26ec50e8f75f7e62df7ffd5e6affb4816cc2
SHA512bff753109457582b12ab756012e256d63d61c11e5c585539d2c4604663238870ee9d120f6148afba0bd93b36aa2a2067d8a0d842815814b38494c12d4a4a3b1e