Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 15:29

General

  • Target

    0e95ee725ac0e303c4a3221710dc0ff6_JaffaCakes118.exe

  • Size

    437KB

  • MD5

    0e95ee725ac0e303c4a3221710dc0ff6

  • SHA1

    bbdf9745617ca1d3b154df2476130a3875ae6d6a

  • SHA256

    42cbb67e3b9f32d38eb57904bb4316f491923498db513c63ea941744f416b077

  • SHA512

    b2620c4903af052f512fe5158a74c6074220fe4004af91ed637077ddeb485e78c0c64e1c9aa217ba8d501973e6097b24d2c2b46d78ecfcf14924dff0e88e2836

  • SSDEEP

    6144:c64KgeRTkQSE7M/Kj7Us9Xuf4oXnuUEF9GCpiQ+Zn3BEb/6r0u:c6ZgeRYxEI/KjQs9y3X/it2r

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 5 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e95ee725ac0e303c4a3221710dc0ff6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0e95ee725ac0e303c4a3221710dc0ff6_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Program Files\Common Files\maolan.exe
      "C:\Program Files\Common Files\maolan.exe" "C:\Program Files\Common Files\maolan.dll" ServiceMain
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1872
    • C:\Documents and Settings\qiuqi1.exe
      "C:\Documents and Settings\qiuqi1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del C:\DOCUME~1\qiuqi1.exe
        3⤵
          PID:2752
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del C:\Users\Admin\AppData\Local\Temp\0E95EE~1.EXE
        2⤵
          PID:2520

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files\Common Files\maolan.dll

              Filesize

              24.1MB

              MD5

              d9251a3b547765602930869f1cc5110d

              SHA1

              3c3c8586f5de17ee03d0c62f9d499cd73ff1ce07

              SHA256

              0cafcb6c05058a10859e361d2741a70238d06dc95f739f32e7ae5c7cb41a24e0

              SHA512

              ef56ac1542602914d0bb0185d0d2a69ee003c0dadf561622976e58c78b57da84804a19ca7d3b5b7cd20975eac6a61c0a6eb94ead5df2f659298a333505ac5be4

            • \Program Files\Common Files\maolan.exe

              Filesize

              43KB

              MD5

              51138beea3e2c21ec44d0932c71762a8

              SHA1

              8939cf35447b22dd2c6e6f443446acc1bf986d58

              SHA256

              5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

              SHA512

              794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

            • \Users\qiuqi1.exe

              Filesize

              24.0MB

              MD5

              cfdf64b19b9f0ef7cb81a5815ca57ca1

              SHA1

              d060d74f63b17b6eb77bc748517519c38b830931

              SHA256

              60708b76c6443596431954a696933dd2bfc12b0cbc32a88ba6b794646bd70edd

              SHA512

              fbd9473580ed942f7cf89d9207206b318963bdfd19a4e6f0afd7757a6d2884741727bba5f0b60023bf0d9c48124c9fc3ae4fff34e95455220b65d986bd33b434

            • memory/1872-26-0x0000000020000000-0x0000000020027000-memory.dmp

              Filesize

              156KB

            • memory/2544-45-0x0000000000400000-0x0000000000406000-memory.dmp

              Filesize

              24KB

            • memory/2544-41-0x0000000000020000-0x0000000000026000-memory.dmp

              Filesize

              24KB

            • memory/2544-42-0x0000000000020000-0x0000000000026000-memory.dmp

              Filesize

              24KB

            • memory/2544-36-0x0000000000400000-0x0000000000406000-memory.dmp

              Filesize

              24KB

            • memory/2988-6-0x0000000000400000-0x0000000000479000-memory.dmp

              Filesize

              484KB

            • memory/2988-0-0x0000000000400000-0x0000000000479000-memory.dmp

              Filesize

              484KB

            • memory/2988-2-0x0000000000310000-0x0000000000389000-memory.dmp

              Filesize

              484KB

            • memory/2988-3-0x0000000000310000-0x000000000034E000-memory.dmp

              Filesize

              248KB

            • memory/2988-27-0x0000000000400000-0x0000000000479000-memory.dmp

              Filesize

              484KB

            • memory/2988-28-0x0000000000310000-0x0000000000389000-memory.dmp

              Filesize

              484KB

            • memory/2988-30-0x0000000000310000-0x000000000034E000-memory.dmp

              Filesize

              248KB

            • memory/2988-1-0x0000000000310000-0x0000000000389000-memory.dmp

              Filesize

              484KB

            • memory/2988-33-0x00000000003A0000-0x00000000003A6000-memory.dmp

              Filesize

              24KB

            • memory/2988-7-0x0000000000270000-0x0000000000271000-memory.dmp

              Filesize

              4KB

            • memory/2988-8-0x0000000000280000-0x0000000000282000-memory.dmp

              Filesize

              8KB

            • memory/2988-4-0x0000000000310000-0x000000000034E000-memory.dmp

              Filesize

              248KB

            • memory/2988-43-0x0000000000310000-0x000000000034E000-memory.dmp

              Filesize

              248KB

            • memory/2988-44-0x0000000000400000-0x0000000000479000-memory.dmp

              Filesize

              484KB

            • memory/2988-5-0x0000000000400000-0x0000000000479000-memory.dmp

              Filesize

              484KB