Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-07-2024 09:36

General

  • Target

    2577747ad465ec54f40142fe1f12a4c0_JaffaCakes118.exe

  • Size

    125KB

  • MD5

    2577747ad465ec54f40142fe1f12a4c0

  • SHA1

    396eb9d14f2c989c58ccc0e6203648af85d7eea1

  • SHA256

    8c13cd02fe74a53a8a857f32e26bcc0c6ebb7c5ae04a31f930fe6726d48dd839

  • SHA512

    c1b173c2d237c3a5b86c95f19244b0178002e32ea740f89b4bdea210a5d942c91a34e000ff314cc7a49a6e9adccdb634c872d948364962bebe05a5ff968d92ae

  • SSDEEP

    3072:R4mIXBt4yv0xLDHfGIILm4sTK7yyyCxkHcI1:R4PBVcLNIGTKACxrM

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Drops file in Drivers directory 2 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2577747ad465ec54f40142fe1f12a4c0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2577747ad465ec54f40142fe1f12a4c0_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3920
    • C:\Users\Admin\AppData\Local\Temp\2577747ad465ec54f40142fe1f12a4c0_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\2577747ad465ec54f40142fe1f12a4c0_JaffaCakes118.exe
      2⤵
      • Drops file in Drivers directory
      • Server Software Component: Terminal Services DLL
      • Loads dropped DLL
      • Drops file in System32 directory
      PID:3444
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility
    1⤵
    • Drops file in Drivers directory
    • Deletes itself
    • Loads dropped DLL
    PID:4820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dll.tmp

    Filesize

    95KB

    MD5

    cc20396466ef1a30eed301d07820f388

    SHA1

    c0d5385d454b40129e645de4ef38edac4812c680

    SHA256

    c515a56f0cbadd89dd650120826e457c6f2ea62a6f8808901c8e35432d7e15ad

    SHA512

    d95a286bb31fb023a7c568e281f40423b31187b5aff8c77db6d21f909957a56cf43c5c10d985f0ab9f30e9ed9cea606eb691b0e819b23d4ebe6a6dd9eef80931

  • C:\Windows\SysWOW64\install.tmp

    Filesize

    84B

    MD5

    3fd7b68336525b18d9118d66f1a77de2

    SHA1

    91833351aa3ccc436c791b8a46ff8171f6d321d7

    SHA256

    f83b3ff9c3643eed913e7b97f24679318fcf95643bbea6d81cf2fd814a42a2ec

    SHA512

    b18b65c41cbc6a77787f577e17c17dd45de7abbf8cd5b61b7a742d69342277763b6e402662968081b2d5f453d6e87ae099f89a69fcedb760930ffec8f3797d38

  • memory/3444-1-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3444-4-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3444-6-0x0000000013140000-0x0000000013166200-memory.dmp

    Filesize

    152KB

  • memory/3444-14-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3920-0-0x0000000013140000-0x0000000013166200-memory.dmp

    Filesize

    152KB

  • memory/3920-8-0x0000000013140000-0x0000000013166200-memory.dmp

    Filesize

    152KB

  • memory/3920-5-0x00000000004E0000-0x00000000004E1000-memory.dmp

    Filesize

    4KB

  • memory/3920-3-0x00000000004F0000-0x00000000004F1000-memory.dmp

    Filesize

    4KB