Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe
-
Size
234KB
-
MD5
2a79e41003bd0be1b9c05478d701b6e0
-
SHA1
1c16edc78c6e535cdf0e4e44ac6e45453949eacf
-
SHA256
1dc6a4e5fabf3ae648d3f7f4e58bb45c584b59fd4a0323de02e59765114c6d9c
-
SHA512
d0b5c37d75cdfdd95bc3e1695ecd56cf346f5c2eb51d505d47b49425bdbc2ec7ff7a78acad25be9591f73a8ba55935fe2ba07215563c73ff9a40d49946671095
-
SSDEEP
3072:WpTBizAiqdhoCylcf76jFLm5qfuMq8Z+FqXs8cDNqR/nu5/ABslHk:WpVSqdwFq5qmM+F1rDYnQ/Ab
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/memory/2816-3-0x0000000000400000-0x000000000043C000-memory.dmp family_gh0strat behavioral2/files/0x000a00000002339c-4.dat family_gh0strat behavioral2/memory/4168-6-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat behavioral2/memory/4168-8-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat behavioral2/memory/4168-11-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat -
Deletes itself 1 IoCs
pid Process 4168 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4168 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\linkinfo.dll 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe File opened for modification C:\Windows\linkinfo.dll 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2816 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe 2816 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe 2816 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe 2816 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4168 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3492 wrote to memory of 2816 3492 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe 82 PID 3492 wrote to memory of 2816 3492 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe 82 PID 3492 wrote to memory of 2816 3492 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe 82 PID 2816 wrote to memory of 4564 2816 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe 83 PID 2816 wrote to memory of 4564 2816 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe 83 PID 2816 wrote to memory of 4564 2816 2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe 83 PID 4564 wrote to memory of 4168 4564 cmd.exe 85 PID 4564 wrote to memory of 4168 4564 cmd.exe 85 PID 4564 wrote to memory of 4168 4564 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\2a79e41003bd0be1b9c05478d701b6e0_JaffaCakes118.exe2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\cmd.execmd.exe /c rundll32.exe C:\Windows\linkinfo.dll hi3⤵
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\linkinfo.dll hi4⤵
- Deletes itself
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:4168
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD54b0142479deed1971340aa9a30a4f440
SHA1c6664a423710289805f935798b2ac232d7d0caba
SHA2566486435e19bcb0054eed429d20e441a889ac0a02bd12e3ba17eea2cee485d78b
SHA51274a72a726f2b625342c3d55579050bc1938cc866ea629f71cf293e0648d1a4e43af4f623ec96f93eba86efca216e37ab3f5211e015e45101372f811663db8f1d