Malware Analysis Report

2025-03-15 06:32

Sample ID 240624-wjqjhsverc
Target 09fbacf8a3fb632201cd8253c826605b_JaffaCakes118
SHA256 a161f38f106a81e7844232b28693599c817df35c1b892dfb9159a3c36c395b04
Tags
gh0strat persistence rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a161f38f106a81e7844232b28693599c817df35c1b892dfb9159a3c36c395b04

Threat Level: Known bad

The file 09fbacf8a3fb632201cd8253c826605b_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

gh0strat persistence rat

Gh0st RAT payload

Gh0strat

Server Software Component: Terminal Services DLL

Loads dropped DLL

Drops file in Program Files directory

Unsigned PE

Suspicious behavior: RenamesItself

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-24 17:57

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-24 17:57

Reported

2024-06-24 17:59

Platform

win10v2004-20240226-en

Max time kernel

141s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe"

Signatures

Gh0st RAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Gh0strat

rat gh0strat

Server Software Component: Terminal Services DLL

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\netsvcs_Microsoft Wsevnz oojwuvjn\Parameters\ServiceDll = "C:\\Program Files (x86)\\Common Files\\Dvydvy.dll" C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\Common Files\Dvydvy.dll C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe N/A

Suspicious behavior: RenamesItself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe"

C:\Windows\SysWOW64\svchost.exe

C:\Windows\SysWOW64\svchost.exe -k netsvcs -p

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3700 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 mdzz2022.noip.cn udp
US 203.191.39.239:35661 mdzz2022.noip.cn tcp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 44.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
GB 142.250.179.234:443 chromewebstore.googleapis.com tcp
US 8.8.8.8:53 pki.goog udp
US 8.8.8.8:53 pki.goog udp
US 216.239.32.29:80 pki.goog tcp
US 8.8.8.8:53 i.pki.goog udp
US 8.8.8.8:53 i.pki.goog udp
GB 172.217.169.67:80 i.pki.goog tcp
US 8.8.8.8:53 29.32.239.216.in-addr.arpa udp
US 8.8.8.8:53 234.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 67.169.217.172.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 mdzz2022.noip.cn udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 203.191.39.239:35661 mdzz2022.noip.cn tcp
US 8.8.8.8:53 107.12.20.2.in-addr.arpa udp
US 13.107.246.64:443 tcp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 mdzz2022.noip.cn udp
US 203.191.39.239:35661 mdzz2022.noip.cn tcp
US 8.8.8.8:53 98.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 mdzz2022.noip.cn udp
US 203.191.39.239:35661 mdzz2022.noip.cn tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 mdzz2022.noip.cn udp
US 203.191.39.239:35661 mdzz2022.noip.cn tcp
US 8.8.8.8:53 mdzz2022.noip.cn udp
US 203.191.39.239:35661 mdzz2022.noip.cn tcp
US 8.8.8.8:53 mdzz2022.noip.cn udp
US 8.8.8.8:53 90.65.42.20.in-addr.arpa udp
US 203.191.39.239:35661 mdzz2022.noip.cn tcp

Files

C:\Program Files (x86)\Common Files\Dvydvy.dll

MD5 3322b14282f47479052f17c6dd79fb22
SHA1 c6cf612bd1e452f4016f0bd202fe46829a8e3915
SHA256 82ee5a35cb5f81441222462c687ab472b0fd01ead370f9ecf87c34cc494ee202
SHA512 9634bb9388794d4b184e8243b31bcabc4fb59ba5eda91b6ecf839cf63a750d3dc971ec91127d0454960519977de6bf5f2f86718562750631379460435b49405c

memory/4136-3-0x0000000000400000-0x0000000000430000-memory.dmp

memory/4104-4-0x0000000001740000-0x0000000001749000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-24 17:57

Reported

2024-06-24 17:59

Platform

win7-20240508-en

Max time kernel

145s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe"

Signatures

Gh0st RAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Gh0strat

rat gh0strat

Server Software Component: Terminal Services DLL

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\netsvcs_Microsoft Wsevnz oojwuvjn\Parameters\ServiceDll = "C:\\Program Files (x86)\\Common Files\\Dvydvy.dll" C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\Common Files\Dvydvy.dll C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe N/A

Suspicious behavior: RenamesItself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\09fbacf8a3fb632201cd8253c826605b_JaffaCakes118.exe"

C:\Windows\SysWOW64\svchost.exe

C:\Windows\SysWOW64\svchost.exe -k netsvcs -p

Network

Country Destination Domain Proto
US 8.8.8.8:53 mdzz2022.noip.cn udp
US 8.8.8.8:53 mdzz2022.noip.cn udp
US 8.8.8.8:53 mdzz2022.noip.cn udp
US 8.8.8.8:53 mdzz2022.noip.cn udp
US 8.8.8.8:53 mdzz2022.noip.cn udp
US 8.8.8.8:53 mdzz2022.noip.cn udp
US 8.8.8.8:53 mdzz2022.noip.cn udp
US 8.8.8.8:53 mdzz2022.noip.cn udp
US 8.8.8.8:53 mdzz2022.noip.cn udp
US 8.8.8.8:53 mdzz2022.noip.cn udp
US 8.8.8.8:53 mdzz2022.noip.cn udp
US 8.8.8.8:53 mdzz2022.noip.cn udp
US 8.8.8.8:53 mdzz2022.noip.cn udp

Files

\??\c:\program files (x86)\common files\dvydvy.dll

MD5 3322b14282f47479052f17c6dd79fb22
SHA1 c6cf612bd1e452f4016f0bd202fe46829a8e3915
SHA256 82ee5a35cb5f81441222462c687ab472b0fd01ead370f9ecf87c34cc494ee202
SHA512 9634bb9388794d4b184e8243b31bcabc4fb59ba5eda91b6ecf839cf63a750d3dc971ec91127d0454960519977de6bf5f2f86718562750631379460435b49405c

memory/2652-4-0x0000000000120000-0x0000000000129000-memory.dmp

memory/1580-3-0x0000000000400000-0x0000000000430000-memory.dmp