Analysis

  • max time kernel
    150s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/07/2024, 15:29

General

  • Target

    22d9e1dce58e433f5a4cca834c0675d9_JaffaCakes118.exe

  • Size

    117KB

  • MD5

    22d9e1dce58e433f5a4cca834c0675d9

  • SHA1

    c927021bd8bfeeb5a34792932db90fbc075dfd4e

  • SHA256

    a15f052086819772772043256c94bbde6d77156ea9827f07080913990a652187

  • SHA512

    f5e3c03ba286eceb7ea11ad237e2f6cfe42f2428d6c9471ec61384da60247e54e4c49633ccc880574c4bd63027d1999b56025d4e3c730fb859b26c11bffddb0a

  • SSDEEP

    3072:yM5+atHs9kw/lelEOv79EkXOBuMMbGEOUJnYHjy:y0+askw/clEOz9EHxMK6Jn0y

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22d9e1dce58e433f5a4cca834c0675d9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\22d9e1dce58e433f5a4cca834c0675d9_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    PID:4524
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Deletes itself
    • Loads dropped DLL
    PID:1944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\documents and settings\local user\ntuser.dll

    Filesize

    98KB

    MD5

    28187fabd4f94a9361ac357952b9bc6b

    SHA1

    5dfb57399c7c0b85fc6ab4eb748247c9091c2727

    SHA256

    a957237b30c6b9e82d0ae63348c343d4e373fd7aec7325b3a977d4124eb6f4e1

    SHA512

    52c36cfa6c9df66c5025511e8cd9b7f797ebaf9dabd738a7e83bbe5da0c710237b161704ac49a2a85578a88e8df3bf2230c6d12859c2e3a782d5d4c3d49883fb

  • memory/1944-5-0x0000000010000000-0x000000001001B000-memory.dmp

    Filesize

    108KB

  • memory/4524-0-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/4524-4-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB