Analysis Overview
SHA256
a161f38f106a81e7844232b28693599c817df35c1b892dfb9159a3c36c395b04
Threat Level: Known bad
The file 09fbacf8a3fb632201cd8253c826605b_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
Gh0st RAT payload
Gh0strat
Server Software Component: Terminal Services DLL
Loads dropped DLL
Drops file in Program Files directory
Unsigned PE
Suspicious behavior: RenamesItself
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-24 17:57
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-24 17:57
Reported
2024-06-24 17:59
Platform
win10v2004-20240226-en
Max time kernel
141s
Max time network
153s
Command Line
Signatures
Gh0st RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Gh0strat
Server Software Component: Terminal Services DLL
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\netsvcs_Microsoft Wsevnz oojwuvjn\Parameters\ServiceDll = "C:\\Program Files (x86)\\Common Files\\Dvydvy.dll" | C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\svchost.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files (x86)\Common Files\Dvydvy.dll | C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe | N/A |
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe"
C:\Windows\SysWOW64\svchost.exe
C:\Windows\SysWOW64\svchost.exe -k netsvcs -p
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3700 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
| US | 203.191.39.239:35661 | mdzz2022.noip.cn | tcp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 44.56.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | chromewebstore.googleapis.com | udp |
| US | 8.8.8.8:53 | chromewebstore.googleapis.com | udp |
| US | 8.8.8.8:53 | chromewebstore.googleapis.com | udp |
| US | 8.8.8.8:53 | chromewebstore.googleapis.com | udp |
| GB | 142.250.179.234:443 | chromewebstore.googleapis.com | tcp |
| US | 8.8.8.8:53 | pki.goog | udp |
| US | 8.8.8.8:53 | pki.goog | udp |
| US | 216.239.32.29:80 | pki.goog | tcp |
| US | 8.8.8.8:53 | i.pki.goog | udp |
| US | 8.8.8.8:53 | i.pki.goog | udp |
| GB | 172.217.169.67:80 | i.pki.goog | tcp |
| US | 8.8.8.8:53 | 29.32.239.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 234.179.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.169.217.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 203.191.39.239:35661 | mdzz2022.noip.cn | tcp |
| US | 8.8.8.8:53 | 107.12.20.2.in-addr.arpa | udp |
| US | 13.107.246.64:443 | tcp | |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
| US | 203.191.39.239:35661 | mdzz2022.noip.cn | tcp |
| US | 8.8.8.8:53 | 98.58.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
| US | 203.191.39.239:35661 | mdzz2022.noip.cn | tcp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
| US | 203.191.39.239:35661 | mdzz2022.noip.cn | tcp |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
| US | 203.191.39.239:35661 | mdzz2022.noip.cn | tcp |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
| US | 8.8.8.8:53 | 90.65.42.20.in-addr.arpa | udp |
| US | 203.191.39.239:35661 | mdzz2022.noip.cn | tcp |
Files
C:\Program Files (x86)\Common Files\Dvydvy.dll
| MD5 | 3322b14282f47479052f17c6dd79fb22 |
| SHA1 | c6cf612bd1e452f4016f0bd202fe46829a8e3915 |
| SHA256 | 82ee5a35cb5f81441222462c687ab472b0fd01ead370f9ecf87c34cc494ee202 |
| SHA512 | 9634bb9388794d4b184e8243b31bcabc4fb59ba5eda91b6ecf839cf63a750d3dc971ec91127d0454960519977de6bf5f2f86718562750631379460435b49405c |
memory/4136-3-0x0000000000400000-0x0000000000430000-memory.dmp
memory/4104-4-0x0000000001740000-0x0000000001749000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-24 17:57
Reported
2024-06-24 17:59
Platform
win7-20240508-en
Max time kernel
145s
Max time network
149s
Command Line
Signatures
Gh0st RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Gh0strat
Server Software Component: Terminal Services DLL
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\netsvcs_Microsoft Wsevnz oojwuvjn\Parameters\ServiceDll = "C:\\Program Files (x86)\\Common Files\\Dvydvy.dll" | C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\svchost.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files (x86)\Common Files\Dvydvy.dll | C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe | N/A |
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe"
C:\Windows\SysWOW64\svchost.exe
C:\Windows\SysWOW64\svchost.exe -k netsvcs -p
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
| US | 8.8.8.8:53 | mdzz2022.noip.cn | udp |
Files
\??\c:\program files (x86)\common files\dvydvy.dll
| MD5 | 3322b14282f47479052f17c6dd79fb22 |
| SHA1 | c6cf612bd1e452f4016f0bd202fe46829a8e3915 |
| SHA256 | 82ee5a35cb5f81441222462c687ab472b0fd01ead370f9ecf87c34cc494ee202 |
| SHA512 | 9634bb9388794d4b184e8243b31bcabc4fb59ba5eda91b6ecf839cf63a750d3dc971ec91127d0454960519977de6bf5f2f86718562750631379460435b49405c |
memory/2652-4-0x0000000000120000-0x0000000000129000-memory.dmp
memory/1580-3-0x0000000000400000-0x0000000000430000-memory.dmp