Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 08:37
Static task
static1
Behavioral task
behavioral1
Sample
0d67551acc283c7a1985fd021c0dce3f_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
0d67551acc283c7a1985fd021c0dce3f_JaffaCakes118.exe
-
Size
196KB
-
MD5
0d67551acc283c7a1985fd021c0dce3f
-
SHA1
747d6d2825a842699b2c33d9d7fdb9ec0e472733
-
SHA256
130300709631d7a5b337e4d88d8a994a9a6dfc220dfba8683b4fd7ff0159938a
-
SHA512
5561650c3950d5970ac36dc992a9c4ca92d0ca49c1b4bfb0372e30fc522765fd4ae61b138b0c27527e675cc709e3b45a6e8e06ed2393a84cb5403dfb136714ce
-
SSDEEP
3072:eHun0evOvtYzonqSioDXxbuE9w2qbXUeZPtrQ/a/4qxyMlZV:KI0evOvtoSiodbuYzqDvZC/a4qxfV
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1740-11-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 1784 gpvwitbbue -
Loads dropped DLL 1 IoCs
pid Process 1740 0d67551acc283c7a1985fd021c0dce3f_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1740 0d67551acc283c7a1985fd021c0dce3f_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1740 0d67551acc283c7a1985fd021c0dce3f_JaffaCakes118.exe Token: SeBackupPrivilege 1740 0d67551acc283c7a1985fd021c0dce3f_JaffaCakes118.exe Token: SeBackupPrivilege 1740 0d67551acc283c7a1985fd021c0dce3f_JaffaCakes118.exe Token: SeRestorePrivilege 1740 0d67551acc283c7a1985fd021c0dce3f_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d67551acc283c7a1985fd021c0dce3f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0d67551acc283c7a1985fd021c0dce3f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1740 -
\??\c:\users\admin\appdata\local\gpvwitbbue"C:\Users\Admin\AppData\Local\Temp\0d67551acc283c7a1985fd021c0dce3f_JaffaCakes118.exe" a -sc:\users\admin\appdata\local\temp\0d67551acc283c7a1985fd021c0dce3f_jaffacakes118.exe2⤵
- Executes dropped EXE
PID:1784
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23.0MB
MD5d172ed066ddd499aca393e975097b6bd
SHA1d38c96220666a902bdb24959ea580f1bca82a1e0
SHA256a2b740dbc211c834590d26be3a75f2a252d43b5d732ec40cf9c9f2f18c742711
SHA5122224d81c32e83a48dd1dac621c4125173fdb4a0bc65f10412544ac300f6824f396cce58cbbd79693c5d0091cee36bcc7a5c2d61f92ab5c014c95bfbb9d4eab62