Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe
-
Size
234KB
-
MD5
2a79e41003bd0be1b9c05478d701b6e0
-
SHA1
1c16edc78c6e535cdf0e4e44ac6e45453949eacf
-
SHA256
1dc6a4e5fabf3ae648d3f7f4e58bb45c584b59fd4a0323de02e59765114c6d9c
-
SHA512
d0b5c37d75cdfdd95bc3e1695ecd56cf346f5c2eb51d505d47b49425bdbc2ec7ff7a78acad25be9591f73a8ba55935fe2ba07215563c73ff9a40d49946671095
-
SSDEEP
3072:WpTBizAiqdhoCylcf76jFLm5qfuMq8Z+FqXs8cDNqR/nu5/ABslHk:WpVSqdwFq5qmM+F1rDYnQ/Ab
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral1/memory/2612-5-0x0000000000400000-0x000000000043C000-memory.dmp family_gh0strat behavioral1/files/0x0008000000016d46-6.dat family_gh0strat behavioral1/memory/2776-7-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat behavioral1/memory/2776-9-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat behavioral1/memory/2776-12-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat -
Deletes itself 1 IoCs
pid Process 2776 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\linkinfo.dll 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe File opened for modification C:\Windows\linkinfo.dll 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2612 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe 2612 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2776 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2612 2976 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe 30 PID 2976 wrote to memory of 2612 2976 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe 30 PID 2976 wrote to memory of 2612 2976 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe 30 PID 2976 wrote to memory of 2612 2976 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe 30 PID 2612 wrote to memory of 2320 2612 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe 31 PID 2612 wrote to memory of 2320 2612 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe 31 PID 2612 wrote to memory of 2320 2612 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe 31 PID 2612 wrote to memory of 2320 2612 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe 31 PID 2320 wrote to memory of 2776 2320 cmd.exe 33 PID 2320 wrote to memory of 2776 2320 cmd.exe 33 PID 2320 wrote to memory of 2776 2320 cmd.exe 33 PID 2320 wrote to memory of 2776 2320 cmd.exe 33 PID 2320 wrote to memory of 2776 2320 cmd.exe 33 PID 2320 wrote to memory of 2776 2320 cmd.exe 33 PID 2320 wrote to memory of 2776 2320 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.execmd.exe /c rundll32.exe C:\Windows\linkinfo.dll hi3⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\linkinfo.dll hi4⤵
- Deletes itself
- Suspicious behavior: GetForegroundWindowSpam
PID:2776
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD54b0142479deed1971340aa9a30a4f440
SHA1c6664a423710289805f935798b2ac232d7d0caba
SHA2566486435e19bcb0054eed429d20e441a889ac0a02bd12e3ba17eea2cee485d78b
SHA51274a72a726f2b625342c3d55579050bc1938cc866ea629f71cf293e0648d1a4e43af4f623ec96f93eba86efca216e37ab3f5211e015e45101372f811663db8f1d