Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 20:49
Static task
static1
Behavioral task
behavioral1
Sample
26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
26295f8c317aee445771bb0f28ab3e0f
-
SHA1
34cd9cd9fcb61d1a885a5a27b985fd651bc3f818
-
SHA256
b017aad56c94286438c221c9891ea8715dcb571c398c321733075286af88c505
-
SHA512
3b9ceb5d2b53d8a3d49571cdfa0d24763f0416cb0067aa9759dd5067c429c607eeef39273656b66667005e537aec558d33773f44a123797b34dd4c8216c64016
-
SSDEEP
24576:tL4m66c5teDuutUNNQ/y4FLFr21Gk5haip3:VxetuOTg2jzb
Malware Config
Signatures
-
Gh0st RAT payload 18 IoCs
resource yara_rule behavioral1/memory/1644-0-0x0000000000401000-0x0000000000469000-memory.dmp family_gh0strat behavioral1/memory/1644-8-0x0000000000400000-0x000000000056A000-memory.dmp family_gh0strat behavioral1/memory/2664-13-0x0000000000400000-0x000000000056A000-memory.dmp family_gh0strat behavioral1/files/0x0038000000014e89-16.dat family_gh0strat behavioral1/memory/2664-21-0x0000000000400000-0x000000000056A000-memory.dmp family_gh0strat behavioral1/memory/2664-22-0x0000000000400000-0x000000000056A000-memory.dmp family_gh0strat behavioral1/memory/2664-23-0x0000000000400000-0x000000000056A000-memory.dmp family_gh0strat behavioral1/memory/2664-24-0x0000000000400000-0x000000000056A000-memory.dmp family_gh0strat behavioral1/memory/2664-25-0x0000000000400000-0x000000000056A000-memory.dmp family_gh0strat behavioral1/memory/2664-26-0x0000000000400000-0x000000000056A000-memory.dmp family_gh0strat behavioral1/memory/2664-27-0x0000000000400000-0x000000000056A000-memory.dmp family_gh0strat behavioral1/memory/2664-28-0x0000000000400000-0x000000000056A000-memory.dmp family_gh0strat behavioral1/memory/2664-29-0x0000000000400000-0x000000000056A000-memory.dmp family_gh0strat behavioral1/memory/2664-30-0x0000000000400000-0x000000000056A000-memory.dmp family_gh0strat behavioral1/memory/2664-31-0x0000000000400000-0x000000000056A000-memory.dmp family_gh0strat behavioral1/memory/2664-32-0x0000000000400000-0x000000000056A000-memory.dmp family_gh0strat behavioral1/memory/2664-33-0x0000000000400000-0x000000000056A000-memory.dmp family_gh0strat behavioral1/memory/2664-34-0x0000000000400000-0x000000000056A000-memory.dmp family_gh0strat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{fuds00yf-18z8-5yl6-nlbh-wq0zu0y2nhg0} 26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{fuds00yf-18z8-5yl6-nlbh-wq0zu0y2nhg0}\stubpath = "C:\\Windows\\system32\\inxiaqxbm.exe" 26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2664 inxiaqxbm.exe -
Executes dropped EXE 1 IoCs
pid Process 2664 inxiaqxbm.exe -
Loads dropped DLL 5 IoCs
pid Process 1644 26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe 2664 inxiaqxbm.exe 2664 inxiaqxbm.exe 2664 inxiaqxbm.exe 2664 inxiaqxbm.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\inxiaqxbm.exe 26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe File created C:\Windows\SysWOW64\syslog.dat 26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\inxiaqxbm.exe_lang.ini 26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1644 26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe 2664 inxiaqxbm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 85899345940 1644 26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe Token: 85899345940 2664 inxiaqxbm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2664 inxiaqxbm.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2664 1644 26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe 28 PID 1644 wrote to memory of 2664 1644 26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe 28 PID 1644 wrote to memory of 2664 1644 26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe 28 PID 1644 wrote to memory of 2664 1644 26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe 28 PID 1644 wrote to memory of 2664 1644 26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe 28 PID 1644 wrote to memory of 2664 1644 26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe 28 PID 1644 wrote to memory of 2664 1644 26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\inxiaqxbm.exeC:\Windows\system32\inxiaqxbm.exe ZhuDongdelC:\Users\Admin\AppData\Local\Temp\26295f8c317aee445771bb0f28ab3e0f_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD55e22e7c15e31f09f0293287d826ce4f6
SHA19debef127af3b931f3165aecff85dfa4cf536eb2
SHA256e274e5d4112b5493ed6109855145e59be730ef9cd76fd76dbed8340748bb37ef
SHA512cce73ccf8a96d7b5f16220a49eafd15ca06eb5de101104ee59d9ba0f61a66baa100fe71533aebc33cfa71a46fa457125a82f12c12965812af9d9e8471d8a1ddc
-
Filesize
1.1MB
MD5df3faebe8bd3af3d2aeab89a926720f3
SHA11b5e73fc1e40c86c2a0f96524aca96c7270d74b4
SHA256efbbc4f7aa012e9670bea0f51b2677fd4ce70029aaf1f35e9d54c41b54c9e5c4
SHA5120cbaaaa5af0d258ce458aed10dda348267fbaaedffb77a498f56cadba020c952d92ba2d5de81f2d9ad703be76f7a67e1c1f6e50fe9ffa8d6993aa35f0510e806