Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 16:35
Static task
static1
Behavioral task
behavioral1
Sample
230f85c7314051e503c0693c98935f46_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
230f85c7314051e503c0693c98935f46_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
230f85c7314051e503c0693c98935f46_JaffaCakes118.exe
-
Size
153KB
-
MD5
230f85c7314051e503c0693c98935f46
-
SHA1
ba8377965e6278e1c93eba970fa427094a4d5d9d
-
SHA256
0a693852ca4bbbeb1c64196a3b6fd71300337306e149b9fd3a6119b48aa71447
-
SHA512
8c7c0ff33312258b3eac3de0f4344efacb1c2e98fedcd056a0bbd0d4b1705ced40cfb2dd6ceacb39da53c4fe482d30860babc86ed866f805af44018bca2c6263
-
SSDEEP
3072:NJ/dNdJ7OwMX7cPCW9WXlXOFaSHr0HDcNPxuGeOF6outFnA:/T7OwMXo7oX8oSHr0HDw6oS2
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2968-13-0x0000000010000000-0x000000001002A000-memory.dmp family_gh0strat behavioral1/memory/2968-14-0x0000000010000000-0x000000001002A000-memory.dmp family_gh0strat behavioral1/memory/2968-18-0x0000000010000000-0x000000001002A000-memory.dmp family_gh0strat -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\1275078\Parameters\ServiceDll = "C:\\Windows\\system32\\1275078.dll" 230f85c7314051e503c0693c98935f46_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 1344 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2968 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1275078.dll 230f85c7314051e503c0693c98935f46_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2952 230f85c7314051e503c0693c98935f46_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2952 wrote to memory of 1344 2952 230f85c7314051e503c0693c98935f46_JaffaCakes118.exe 29 PID 2952 wrote to memory of 1344 2952 230f85c7314051e503c0693c98935f46_JaffaCakes118.exe 29 PID 2952 wrote to memory of 1344 2952 230f85c7314051e503c0693c98935f46_JaffaCakes118.exe 29 PID 2952 wrote to memory of 1344 2952 230f85c7314051e503c0693c98935f46_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\230f85c7314051e503c0693c98935f46_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\230f85c7314051e503c0693c98935f46_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\230F85~1.EXE > nul2⤵
- Deletes itself
PID:1344
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k 12750781⤵
- Loads dropped DLL
PID:2968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD501dda7389c62fd054d4f12e85a49195b
SHA14952818fbc4da8a5c1ba5f7d77f74929fb135974
SHA256b98f798e249858de97a1193da6f127c207227b19a06e4417d33179f79f7ae46d
SHA512a419a16f1b163c3f75d2abe47c2c4abe7a73dac468c9312ec52e72ad24bdb9d6ec4c238dce83ebd8e2504bd3ab63f20ca06c9a8fe9a1a67347a394f89f7d0e0e