Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 02:35
Behavioral task
behavioral1
Sample
187b0581de8b305db43aae78ddbb30b3_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
187b0581de8b305db43aae78ddbb30b3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
187b0581de8b305db43aae78ddbb30b3_JaffaCakes118.exe
-
Size
152KB
-
MD5
187b0581de8b305db43aae78ddbb30b3
-
SHA1
615fc51430603ccb2930028844e5791462528d7e
-
SHA256
32c742fe8ec80b74c64dc0266a5509724aab86cd85b4aa4bc82273190a2a5a8e
-
SHA512
667ace81371177a6a0f3b5d8aaac3fd89b49f40c2ab5e13011b05f70d7fd84f1dc2ed86b50c242808c6bb47e179f0f743c03aa3446506f1c832d5027a604db3c
-
SSDEEP
3072:48+UBS4apbbApqx100ljo6bgBvoyFH6uZZuSMgzdG8bf1If0TtkfAi4xO:48+U84apGr0VQzcKzEYf1S0T0Ay
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/memory/1576-0-0x0000000000400000-0x0000000000429000-memory.dmp family_gh0strat behavioral1/files/0x000c0000000122ee-3.dat family_gh0strat behavioral1/memory/2988-5-0x0000000010000000-0x0000000010027000-memory.dmp family_gh0strat behavioral1/memory/1576-6-0x0000000000400000-0x0000000000429000-memory.dmp family_gh0strat -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Rspdates Apxplicatioan\Parameters\ServiceDll = "C:\\Windows\\System32\\Update.dll" 187b0581de8b305db43aae78ddbb30b3_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2988 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2988 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeRestorePrivilege 1576 187b0581de8b305db43aae78ddbb30b3_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\187b0581de8b305db43aae78ddbb30b3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\187b0581de8b305db43aae78ddbb30b3_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Deletes itself
- Loads dropped DLL
PID:2988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5256343dede279e702e0044a47a74eadb
SHA160e9edea701a246a8c6588c78b24cd809e2bbd64
SHA2569ef683dae6c4f3b820963ba2ac2c42d9a5dfb933d9aceb48d5216327fe990a2c
SHA5125a5570dd7c0ba6a27ee8b69792f9bbca713cf9be816d57409c31f00180c9a59c7c2914ed2e0974eb1fdb0936db31d71f9ba33d45e488e791068118cd49d74cb7