Analysis
-
max time kernel
130s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 10:53
Static task
static1
Behavioral task
behavioral1
Sample
221bfe10819ce0c913b1ddfa532536b4_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
221bfe10819ce0c913b1ddfa532536b4_JaffaCakes118.exe
-
Size
96KB
-
MD5
221bfe10819ce0c913b1ddfa532536b4
-
SHA1
a05b5c3cb2be97599d2e5c1117a15f5e915247ea
-
SHA256
09589e3103deb28aa57f4413eb5faa10ed3b88dae5f48a814e0f0b1d0e69029c
-
SHA512
8491dd029cee9ab2eceb5928256c194fb55c05c4858c0a1ff7d13bef0c5fa21dad623cd5fe35f0afacbef7ae8aa430df963ca859115d256d0247ca576955d902
-
SSDEEP
1536:GbFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8preAaSMswn:GVS4jHS8q/3nTzePCwNUh4E9XaSwn
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/files/0x000b000000023376-14.dat family_gh0strat behavioral2/memory/5072-16-0x0000000000400000-0x000000000044E2F0-memory.dmp family_gh0strat behavioral2/memory/3616-19-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/2076-24-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/1044-29-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Deletes itself 1 IoCs
pid Process 5072 djkuxifqvt -
Executes dropped EXE 1 IoCs
pid Process 5072 djkuxifqvt -
Loads dropped DLL 3 IoCs
pid Process 3616 svchost.exe 2076 svchost.exe 1044 svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\kcfgrlwape svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\kktyaoaxda svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\ktirhrcupu svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 4620 3616 WerFault.exe 91 2420 2076 WerFault.exe 96 2916 1044 WerFault.exe 99 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5072 djkuxifqvt 5072 djkuxifqvt -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 5072 djkuxifqvt Token: SeBackupPrivilege 5072 djkuxifqvt Token: SeBackupPrivilege 5072 djkuxifqvt Token: SeRestorePrivilege 5072 djkuxifqvt Token: SeBackupPrivilege 3616 svchost.exe Token: SeRestorePrivilege 3616 svchost.exe Token: SeBackupPrivilege 3616 svchost.exe Token: SeBackupPrivilege 3616 svchost.exe Token: SeSecurityPrivilege 3616 svchost.exe Token: SeSecurityPrivilege 3616 svchost.exe Token: SeBackupPrivilege 3616 svchost.exe Token: SeBackupPrivilege 3616 svchost.exe Token: SeSecurityPrivilege 3616 svchost.exe Token: SeBackupPrivilege 3616 svchost.exe Token: SeBackupPrivilege 3616 svchost.exe Token: SeSecurityPrivilege 3616 svchost.exe Token: SeBackupPrivilege 3616 svchost.exe Token: SeRestorePrivilege 3616 svchost.exe Token: SeBackupPrivilege 2076 svchost.exe Token: SeRestorePrivilege 2076 svchost.exe Token: SeBackupPrivilege 2076 svchost.exe Token: SeBackupPrivilege 2076 svchost.exe Token: SeSecurityPrivilege 2076 svchost.exe Token: SeSecurityPrivilege 2076 svchost.exe Token: SeBackupPrivilege 2076 svchost.exe Token: SeBackupPrivilege 2076 svchost.exe Token: SeSecurityPrivilege 2076 svchost.exe Token: SeBackupPrivilege 2076 svchost.exe Token: SeBackupPrivilege 2076 svchost.exe Token: SeSecurityPrivilege 2076 svchost.exe Token: SeBackupPrivilege 2076 svchost.exe Token: SeRestorePrivilege 2076 svchost.exe Token: SeBackupPrivilege 1044 svchost.exe Token: SeRestorePrivilege 1044 svchost.exe Token: SeBackupPrivilege 1044 svchost.exe Token: SeBackupPrivilege 1044 svchost.exe Token: SeSecurityPrivilege 1044 svchost.exe Token: SeSecurityPrivilege 1044 svchost.exe Token: SeBackupPrivilege 1044 svchost.exe Token: SeBackupPrivilege 1044 svchost.exe Token: SeSecurityPrivilege 1044 svchost.exe Token: SeBackupPrivilege 1044 svchost.exe Token: SeBackupPrivilege 1044 svchost.exe Token: SeSecurityPrivilege 1044 svchost.exe Token: SeBackupPrivilege 1044 svchost.exe Token: SeRestorePrivilege 1044 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3920 wrote to memory of 5072 3920 221bfe10819ce0c913b1ddfa532536b4_JaffaCakes118.exe 86 PID 3920 wrote to memory of 5072 3920 221bfe10819ce0c913b1ddfa532536b4_JaffaCakes118.exe 86 PID 3920 wrote to memory of 5072 3920 221bfe10819ce0c913b1ddfa532536b4_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\221bfe10819ce0c913b1ddfa532536b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\221bfe10819ce0c913b1ddfa532536b4_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3920 -
\??\c:\users\admin\appdata\local\djkuxifqvt"C:\Users\Admin\AppData\Local\Temp\221bfe10819ce0c913b1ddfa532536b4_JaffaCakes118.exe" a -sc:\users\admin\appdata\local\temp\221bfe10819ce0c913b1ddfa532536b4_jaffacakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 7882⤵
- Program crash
PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3616 -ip 36161⤵PID:2276
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 9402⤵
- Program crash
PID:2420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2076 -ip 20761⤵PID:4228
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 8762⤵
- Program crash
PID:2916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1044 -ip 10441⤵PID:3432
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202B
MD56d86cc85864ad6242946b536c1d220bd
SHA1aa8eb5be296ff1c91d77672ccd40c25e71f67bdd
SHA25640ad05a6a677059bd031cf67cc3e6235be7a9215a5ce227cdaea80acc2e9619e
SHA512a48eb42cffde3aa1a8cd775dfa4035d37d754cf575d8b9ff2972f8240290f26af2a22ded6c2d2b99595e2f8b3c18c3ebc16495b867b815e66df93065f794847b
-
Filesize
303B
MD57eefbaa7e1e2561bb541731a52e574ba
SHA18d3ba06f2ef612ee05211c411c7295cf8ed97e2c
SHA2565be0aab8f0056db388bae72aa855c1798294668a7250155e17c2f7064903c574
SHA5129212d9f2eafd1d257379889550c8db5ffd28419f5cd81d02323a2c2777b43d3e13ad0ed9cb7ec23b4b23a4dd02c7a36365dab9348cd4caa6dff84c8cd0563a34
-
Filesize
23.0MB
MD5cd63f2588da44b449e569340e8bdc2b1
SHA1b5aa934a7d1bcee896b59e70a8aed220cf68db5a
SHA2563a3c7f06d5bca3c1746814488c1d55a848d692f0fc9b1558ad177a8c8c387425
SHA512b99e2a16d3cb4663008e23ec297578e45212117cef0d0f57cf9c3996d28732cf95c1bb8f8bfc53113d096d1008126672f6edcb6eb9db5adb6ede52d3e5b62bf8
-
Filesize
22.2MB
MD5dce85c14ea5b004f8caa868c847a9ebd
SHA1a2deb73d1fcbdb5521994ee003779767654058aa
SHA2566534b9e8d9de320727a6aa7a91edb1d715e6978d4352e72a925a478870757b4d
SHA5127c4d39fdbb54b9a1fed8afa91c45b05b8e7a8bdefd22c4035f2210fae062c09146f74511d8f92305481f4970d077877494a5b70fbb90962b34ef360a6d3f7946